2014
DOI: 10.1007/978-3-662-45945-4_15
|View full text |Cite
|
Sign up to set email alerts
|

IPv6 Network Attack Detection with HoneydV6

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2015
2015
2015
2015

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…Although a darknet simplifies the classification of traffic as being either benign or malicious, the fact it contains no actual services is likely to lower the interest of those with bad intents. These studies [4,9,12] do however show an increase in the amount of observed traffic throughout the years.…”
Section: Introductionmentioning
confidence: 73%
See 1 more Smart Citation
“…Although a darknet simplifies the classification of traffic as being either benign or malicious, the fact it contains no actual services is likely to lower the interest of those with bad intents. These studies [4,9,12] do however show an increase in the amount of observed traffic throughout the years.…”
Section: Introductionmentioning
confidence: 73%
“…Once designed with security in mind, after 20 years of developments and implementations, some question whether IPv6 is indeed more secure than its predecessor. As IPv6 is gaining traction, the amount of malicious traffic transferred over it increases [12]. Besides attacks that are based on aspects of the new protocol, we can expect traditional attacks from IPv4 occurring over IPv6 as well, as many types of these threats abuse features or phenomena on higher layers (e.g., the transport or application layer).…”
Section: Introductionmentioning
confidence: 98%
“…Our hybrid architecture extends the low-interaction honeypot Honeydv6 [16] and is called Hyhoneydv6.…”
Section: Hyhoneydv6 Architecturementioning
confidence: 99%
“…Our mechanism works similar to the dynamic machine instantiation of Honeydv6 which creates low-interaction honeypots based on attackers requests [16].…”
Section: Dynamic Instantiation Of High-interaction Honeypotsmentioning
confidence: 99%
See 1 more Smart Citation