| http://www.w3.org/ns/prov#value | - Increasingly, this rogue IPv6 traffic includes attacks such as botnet command and controls.If you are not monitoring your network for IPv6 traffic, the IPv6 pathway can be used as an avenue of attack, says Tim LeMaster, director of systems engineering for Juniper's federal group.
|