{"id":"https://openalex.org/W2743722748","doi":"https://doi.org/10.23919/tma.2017.8002912","title":"Threats and surprises behind IPv6 extension headers","display_name":"Threats and surprises behind IPv6 extension headers","publication_year":2017,"publication_date":"2017-06-01","ids":{"openalex":"https://openalex.org/W2743722748","doi":"https://doi.org/10.23919/tma.2017.8002912","mag":"2743722748"},"language":"en","primary_location":{"id":"doi:10.23919/tma.2017.8002912","is_oa":false,"landing_page_url":"https://doi.org/10.23919/tma.2017.8002912","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Network Traffic Measurement and Analysis Conference (TMA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.utwente.nl/en/publications/0668462b-8002-4374-822f-0af4eb693baa","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5068144761","display_name":"Luuk Hendriks","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Luuk Hendriks","raw_affiliation_strings":["Design and Analysis of Communication Systems, University of Twente, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems, University of Twente, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044735319","display_name":"Petr Velan","orcid":"https://orcid.org/0000-0002-2824-4299"},"institutions":[{"id":"https://openalex.org/I54634078","display_name":"Czech Education and Scientific Network","ror":"https://ror.org/050dkka69","country_code":"CZ","type":"other","lineage":["https://openalex.org/I54634078"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Petr Velan","raw_affiliation_strings":["CESNET, Czech Republic"],"affiliations":[{"raw_affiliation_string":"CESNET, Czech Republic","institution_ids":["https://openalex.org/I54634078"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111930228","display_name":"Ricardo de O. Schmidt","orcid":null},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Ricardo de O. Schmidt","raw_affiliation_strings":["Universiteit Twente, Enschede, Overijssel, NL"],"affiliations":[{"raw_affiliation_string":"Universiteit Twente, Enschede, Overijssel, NL","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085616535","display_name":"Pieter-Tjerk de Boer","orcid":"https://orcid.org/0000-0002-0818-5295"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Pieter-Tjerk de Boer","raw_affiliation_strings":["Design and Analysis of Communication Systems, University of Twente, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems, University of Twente, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5067140003","display_name":"Aiko Pras","orcid":"https://orcid.org/0000-0002-5091-8608"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Aiko Pras","raw_affiliation_strings":["Design and Analysis of Communication Systems, University of Twente, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Design and Analysis of Communication Systems, University of Twente, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5068144761"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":0.2921,"has_fulltext":true,"cited_by_count":11,"citation_normalized_percentile":{"value":0.59906944,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8138012290000916},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.8004376888275146},{"id":"https://openalex.org/keywords/header","display_name":"Header","score":0.7880264520645142},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.6532692909240723},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5691549777984619},{"id":"https://openalex.org/keywords/parsing","display_name":"Parsing","score":0.5257545113563538},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.48187264800071716},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.35980933904647827},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.17008984088897705},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12615573406219482}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8138012290000916},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.8004376888275146},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.7880264520645142},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.6532692909240723},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5691549777984619},{"id":"https://openalex.org/C186644900","wikidata":"https://www.wikidata.org/wiki/Q194152","display_name":"Parsing","level":2,"score":0.5257545113563538},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.48187264800071716},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35980933904647827},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17008984088897705},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12615573406219482}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.23919/tma.2017.8002912","is_oa":false,"landing_page_url":"https://doi.org/10.23919/tma.2017.8002912","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Network Traffic Measurement and Analysis Conference (TMA)","raw_type":"proceedings-article"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/0668462b-8002-4374-822f-0af4eb693baa","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/0668462b-8002-4374-822f-0af4eb693baa","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Hendriks, L, Velan, P, de Oliveira Schmidt, R, de Boer, P T & Pras, A 2017, Threats and surprises behind IPv6 extension headers. in 2017 Network Traffic Measurement and Analysis Conference (TMA). IEEE, Piscataway, NJ, 1st Network Traffic Measurement and Analysis Conference, TMA 2017, Dublin, Ireland, 21/06/17. https://doi.org/10.23919/TMA.2017.8002912","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:is.muni.cz:1387837","is_oa":true,"landing_page_url":"https://is.muni.cz/repo/1387837","pdf_url":null,"source":{"id":"https://openalex.org/S4306400102","display_name":"Ve\u0159ejn\u00e9 slu\u017eby Informa\u010dn\u00edho syst\u00e9mu (Masarykiana Brunensis Universitas)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2017 Network Traffic Measurement and Analysis Conference (TMA)","raw_type":"info:eu-repo/semantics/article"},{"id":"pmh:oai:ris.utwente.nl:publications/0668462b-8002-4374-822f-0af4eb693baa","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/0668462b-8002-4374-822f-0af4eb693baa","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/0668462b-8002-4374-822f-0af4eb693baa","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Hendriks, L, Velan, P, de Oliveira Schmidt, R, de Boer, P T & Pras, A 2017, Threats and surprises behind IPv6 extension headers. in 2017 Network Traffic Measurement and Analysis Conference (TMA). IEEE, Piscataway, NJ, 1st Network Traffic Measurement and Analysis Conference, TMA 2017, Dublin, Ireland, 21/06/17. https://doi.org/10.23919/TMA.2017.8002912","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G176604203","display_name":null,"funder_award_id":"02.1.01/0.0/0.0","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G291036901","display_name":null,"funder_award_id":"CZ.02","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G3490171961","display_name":null,"funder_award_id":"CZ.02.1.01","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G5916014575","display_name":null,"funder_award_id":"CZ.02.1.01/0.0/0.0","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G6594491356","display_name":null,"funder_award_id":"CZ.02.1.01/0.0/0.0/","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"}],"funders":[{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1526831325","https://openalex.org/W1851526348","https://openalex.org/W2046559231","https://openalex.org/W2053550965","https://openalex.org/W2159476783","https://openalex.org/W2467237453","https://openalex.org/W2505864198","https://openalex.org/W2906926620","https://openalex.org/W6638715035","https://openalex.org/W6758076146"],"related_works":["https://openalex.org/W2171597999","https://openalex.org/W2189136227","https://openalex.org/W1866537546","https://openalex.org/W630850086","https://openalex.org/W3200508093","https://openalex.org/W4372053344","https://openalex.org/W3193978431","https://openalex.org/W2379752180","https://openalex.org/W2348848697","https://openalex.org/W2810972022"],"abstract_inverted_index":{"The":[0],"concept":[1],"of":[2,15,42,60],"Extension":[3,26,114,131],"Headers,":[4,115],"newly":[5],"introduced":[6],"with":[7,138],"IPv6,":[8],"is":[9,34,89,111,133],"elusive":[10],"and":[11,55,78,100,105],"enables":[12],"new":[13],"types":[14],"threats":[16,52],"in":[17,75],"the":[18,40,57,61,93,108],"Internet.":[19],"Simply":[20],"dropping":[21,44,127],"all":[22,128],"traffic":[23,46,109,120,129],"containing":[24,130],"any":[25],"Header":[27],"-":[28],"a":[29,135],"current":[30],"practice":[31,137],"by":[32],"operators-seemingly":[33],"an":[35],"effective":[36],"solution,":[37],"but":[38],"at":[39],"cost":[41],"possibly":[43],"legitimate":[45],"as":[47],"well.":[48],"To":[49],"determine":[50],"whether":[51],"indeed":[53],"occur,":[54],"evaluate":[56],"actual":[58],"nature":[59],"traffic,":[62],"measurement":[63],"solutions":[64],"need":[65],"to":[66,91,97],"be":[67,144],"adapted.":[68],"By":[69],"implementing":[70],"these":[71,98],"specific":[72],"parsing":[73],"capabilities":[74],"flow":[76],"exporters":[77],"performing":[79],"measurements":[80],"on":[81],"two":[82],"different":[83],"production":[84],"networks,":[85],"we":[86,116],"show":[87],"it":[88],"feasible":[90],"quantify":[92],"metrics":[94],"directly":[95,122],"related":[96],"threats,":[99],"thus":[101,134],"allow":[102],"for":[103],"monitoring":[104],"detection.":[106],"Analysing":[107],"that":[110,121],"hidden":[112],"behind":[113],"find":[117],"mostly":[118],"benign":[119],"affects":[123],"end-user":[124],"QoE:":[125],"simply":[126],"Headers":[132],"bad":[136],"more":[139],"consequences":[140],"than":[141],"operators":[142],"might":[143],"aware":[145],"of.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
