The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014) 2014
DOI: 10.1109/icitst.2014.7038852
|View full text |Cite
|
Sign up to set email alerts
|

Scaling IPv6 address bindings in support of a moving target defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 4 publications
0
8
0
Order By: Relevance
“…Previous work done by Morrell et al [20] showed that a server can successfully bind up to 60000 randomly generated addresses, with each bound address communicating with an individual client. Based on these observations, the CN should be able to bind and listen on a large number of discarded MT6D addresses.…”
Section: Resultsmentioning
confidence: 99%
“…Previous work done by Morrell et al [20] showed that a server can successfully bind up to 60000 randomly generated addresses, with each bound address communicating with an individual client. Based on these observations, the CN should be able to bind and listen on a large number of discarded MT6D addresses.…”
Section: Resultsmentioning
confidence: 99%
“…Existing SDN-based NDD methods 14,15 mainly concentrate on the study of network address transformation method. However, in practical applications, the failure generation of hopping endpoint information often occurs caused by the conflict of hopping endpoint address generation and high implementation consumption of transformation update.…”
Section: The Overall Design Of the Ndd Systemmentioning
confidence: 99%
“…Existing researches [4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22] have proved that IP hopping technology is an effective method to defend against scanning attack which is normally the first step of many other network attacks such as DDoS [23] and propagation worm [24]. e game between scanning attacker and IP hopping defender is shown in Figure 1.…”
Section: Introductionmentioning
confidence: 99%
“…IP hopping technology is firstly proposed and deployed in legacy network [2,[4][5][6][7][8][9][10][11][12] and proved to be an excellent defensive means. In recent years, software defined network (SDN) [25] has been widely studied and considered as the next network technology.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation