IPV6 and Deep Packet Inspection
Parvathaneni. Tejaswini1, K.V.S. Mounika2, A. Rama Krishna3
1Parvathaneni.Tejaswini, Electronics and Computer Engineering, KL University, Guntur, Krishna District, Andhra Pradesh, India.
2K.V.S. Mounika, Electronics and Computer Engineering, KL University, Guntur, Krishna District, Andhra Pradesh, India.
3A. Rama Krishna, , Electronics and Computer Engineering, KL University, Guntur, Krishna District, Andhra Pradesh, India.

Manuscript received on 15 November 2012 | Revised Manuscript received on 25 November 2012 | Manuscript Published on 30 November 2012 | PP: 62-65 | Volume-1 Issue-6, November 2012 | Retrieval Number: E0332101612/2012©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The current version of the internet, IPV4 was depleted of addresses on february3, 2011. The storage of address has led to the introduction of IPV6 which has 128-bit (16-byte) source and destination IP addresses. Many organisations do not see a reason to convert to IPV6, and believe they are not running IPV6.Whether an organisation knows it or not, any laptop/PC running Vista or Windows 7 is a vulnerability from which attacks can come that will be invisible to IPV4 networks. Since the Internet today uses IPV4 for 99% of the traffic, it will be slow migrations to IPV6.Three transition strategies are being employed: header translation, dual stack and tunnelling of IPV6 inside IPV4.Tunneling is the most precarious method for today’s IPV4 networks. The IPV6 packet is included inside the message field of an IPV4 packet. The content of the IPV6 packet will not be noticed by an IP4 firewall or intrusion detection system. Hidden IPv6 traffic running across an organisation’s network can wreak havoc, allow malware to enter the network, and be the basis for a denial-of-service attack. The only defence against such attacks is deep packet inspection (DPI). The widespread use of DPI is inevitable. The first serious security breach caused by tunnelled IPV6 inside an IPV4 packet is certain to come in the near future. This event will be a stimulus to organisation to defend against such attacks. 
Keywords: Cyber Terrorism, Deep Packet Inspection, IPv4, IPv6, Security.
Scope of the Article: Cyber Terrorism