2012 International Conference on Cyber Security 2012
DOI: 10.1109/cybersecurity.2012.28
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Honeypot System to Capture IPv6 Address Scans

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 7 publications
0
11
0
Order By: Relevance
“…Nine of the eleven architectures do not support or consider IPv6 networks at all. The only other architecture with IPv6 support is presented by Kishimoto et al [11]. However, the presented solution relies on the IPv6 Neighbour Discovery (ND) protocol which limits its applicability to /64-networks, whereas Hyhoneydv6 supports arbitrarily large IPv6 networks.…”
Section: Ipv6 Supportmentioning
confidence: 99%
See 3 more Smart Citations
“…Nine of the eleven architectures do not support or consider IPv6 networks at all. The only other architecture with IPv6 support is presented by Kishimoto et al [11]. However, the presented solution relies on the IPv6 Neighbour Discovery (ND) protocol which limits its applicability to /64-networks, whereas Hyhoneydv6 supports arbitrarily large IPv6 networks.…”
Section: Ipv6 Supportmentioning
confidence: 99%
“…Potemkin implements traffic filters to filter out uninteresting traffic like network scans in order to limit the number of dynamically created machines. The architecture presented by Kishimoto et al restricts the instantiation of new machines to addresses which are generated using the default EUI-64 algorithm [11]. Therefore, networks scans targeting arbitrary address spaces, which may include addresses generated with IPv6 privacy extensions [13], will never cause the instantiation of a machine.…”
Section: Scan Handling Supportmentioning
confidence: 99%
See 2 more Smart Citations
“…There has been research work in the area of Dynamic Honeypot commissioning by [14] where a Honeypot would be deployed upon detecting an address scan targeting an unallocated IP address. Honeypots to be commissioned are virtual machines, based on the MAC address inferred from a NS message, the most appropriate virtual machine in terms of OS etc.…”
Section: Adaptive Honeypots Based On Incoming Ip Scansmentioning
confidence: 99%