As adoption of the IPv6 Internet protocol continues to gain traction, some network security monitoring businesses and industry analysts are starting to see a troubling phenomenon that they call ‘shadow networks’. On a shadow network, data flows through new IPv6-enabled connections and onto the existing IPv4 network, but the IPv4 security in place is unable to identify that IPv6 traffic. All sorts of security perils can arise from that and even though at this point they are only theoretical, security experts worry it may not be long before bad guys figure out a way of using these shadow networks for nefarious purposes
Network Computing
Categories
Shortened URL
Tweet about this to your friends and follower! Use this shortened URL:
http://ul.gd/H8UDl
http://ul.gd/H8UDl