Filters








2,353 Hits in 4.6 sec

Security visualization tools and IPv6 addresses

David Barrera, P.C. van Oorschot
2009 2009 6th International Workshop on Visualization for Cyber Security  
In this paper, we explore the current state of IPv6 support in some popular security visualization tools and identify the roadblocks preventing those tools from supporting the new protocol.  ...  Visualization is used by security analysts to help detect patterns and trends in large volumes of network traffic data.  ...  The second author acknowledges NSERC funding under a Discovery Grant and as Canada Research Chair in Network and Software Security. Partial funding from NSERC ISSNet is also acknowledged.  ... 
doi:10.1109/vizsec.2009.5375538 dblp:conf/vizsec/BarreraO09 fatcat:b672lk4stfalzncq4hbduiwwle

Accommodating IPv6 Addresses in Security Visualization Tools

David Barrera, Paul C van Oorschot
2010 Information Visualization  
In this article, we explore the current state of IPv6 support in some popular security visualization tools and identify the roadblocks preventing those tools from supporting the new protocol.  ...  We also suggest using treemaps for visually representing the vast space of remote addresses in IPv6.  ...  The second author acknowledges Natural Sciences and Engineering Research Council (NSERC) funding under a Discovery Grant and as Canada Research Chair in Internet Authentication and Computer Security.  ... 
doi:10.1057/ivs.2010.9 fatcat:ofggjpi2sbd6rh6kmlhg62672u

Study and Optimized Simulation of OSPFv3 Routing Protocol in IPv6 Network

Md. Anwar Hossain, Mst. Sharmin Akter
2019 Global Journal of Computer Science and Technology  
This paper also contains step by step configuration and explanation in assigning of IPv6 address in routers and end devices.  ...  It also contains the data analysis of packet forwarding through IPv6 on OSPFv3 in simulation mode of cisco packet virtual environment to make the decision eventually secure and faster protocol in IPv6  ...  Types of IPv6 addresses are Multicast addresses, Anycast address and Unicast address.  ... 
doi:10.34257/gjcstevol19is2pg11 fatcat:rxk2afi6vjglvdunxkygvpaari

An introduction to investigating IPv6 networks

Bruce J. Nikkel
2007 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
The enabling of IPv6 capability in a forensics lab is shown, including IPv6 connectivity and the use of IPv6 compatible tools.  ...  This practitioner paper provides an introduction to investigating IPv6 networks and systems. IPv6 addressing, packet structure, and supporting protocols are explained.  ...  IPv6 packet structure The simplicity of the headers and size of the address space can be clearly seen with a visual comparison between IPv4 and IPv6 packets. These are shown in figures 2 and 3.  ... 
doi:10.1016/j.diin.2007.06.001 fatcat:pdlwcqcaoraz5nludz5woftcke

Anonym: A tool for anonymization of the Internet traffic

Tanjila Farah, Ljiljana Trajkovic
2013 2013 IEEE International Conference on Cybernetics (CYBCO)  
Conclusions n The Anonym tool provides options to anonymize time, IPv4 and IPv6 addresses, MAC addresses, and packet length data n Supports log files in mrt and pcap formats n Provides options to analyze  ...  address output nameano='10outv6ano.txt'; writeipv6anon(timeanony6,IPv6s,IPv6d,IPv4sout,IPv4dout,protocol6, pktlengthout,nameano); Validation tests n Implementation of the Anonym tool was validated using  ... 
doi:10.1109/cybconf.2013.6617434 dblp:conf/cybconf/FarahT13 fatcat:f36icjnkrvbkvjqsz4usyxdbpe

A secured delegation of remote services on IPv6 home networks

Stere Preda, Laurent Toutain, Nora Cuppens-Boulahia, Frederic Cuppens, Joaquin Garcia-Alfaro
2009 2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009)  
The generalization of end to end paradigm, possible due to the length of IPv6 addresses, eases the deployment of such services.  ...  In this paper, we study some of the advantages of using the IPv6 protocol in home networks but most particularly how to improve the security of home networks.  ...  Acknowledgments-The work was supported by a grant from the Brittany region of France and by funding from the SEC6 Project.  ... 
doi:10.1109/crisis.2009.5411984 dblp:conf/crisis/PredaTCCG09 fatcat:epu6okh2sbgp3lzydbxfkusace

Intelligent IPv6 based iot network monitoring and altering system on Cooja framework

J. Subramaniam, Y.L. Ho, S. Manickam
2018 Journal of Fundamental and Applied Sciences  
Addressing this issue is tantamount to addressing the security and packet loss issue in Cooja framework; a simulator provided by Con develop and run IoT enabled systems.  ...  On the basis paper discusses and addresses the issues of packet monitoring of IoT device simulations in Cooja framework.  ...  This tool is ipv6 and ipv4 supported just like scapy and snort.  ... 
doi:10.4314/jfas.v9i6s.51 fatcat:dkzo3rsd4zglxawjkqj65k2f5i

A Web-Based Honeypot in IPv6 to Enhance Security

Keyong Wang, Mengyao Tong, Dequan Yang, Yuhang Liu
2020 Information  
While IPv6 has brought excellent convenience to the public, related security issues have gradually emerged, and an assessment of the security situation in IPv6 has also become more important.  ...  IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet.  ...  Redirection Attack, Attacks on Cryptographically Generated Address (CGA), Attacks against IPv6 Service Applications, Security risks under IPv6 and IPv4 dual stack.  ... 
doi:10.3390/info11090440 fatcat:pxa2eowohvetpmhm74jagafh3a

Study on security log visualization and security threat detection using RGB Palette
RGB Palette를 이용한 보안 로그 시각화 및 보안 위협 인식

Dong-Gun Lee, Huy Kang Kim, Eunjin Kim
2015 Journal of the Korea Institute of Information Security and Cryptology  
This paper visualizes the security log using the RGB Palette, offering a quick and effective way to know whether the security threat is occurred.  ...  As a result, there is problem that the detection and response of security threats are delayed. Visualization technique is an effective way to solve this problem.  ...  Barrera[19]는 "Accommodating IPv6 addresses in security visualization tools"를 통해서 현재 많은 보안 시각화 도구들이 IPv4에 맞추어져 있음을 지적하고, IPv6 시대를 대비하여 IPv6에 적용할 수 있는 시각화 방법을 제안하고 있다.  ... 
doi:10.13089/jkiisc.2015.25.1.61 fatcat:3zgavss5s5ghxmjj7r7qhigism

Labelled Dataset on Distributed Denial-of-Service (DDoS) Attacks Based on Internet Control Message Protocol Version 6 (ICMPv6)

Selvakumar Manickam, Adnan Hasan Bdair AIghuraibawi, Rosni Abdullah, Zaid Abdi Alkareem Alyasseri, Karrar Hameed Abdulkareem, Mazin Abed Mohammed, Ayman Alani, Nawab Muhammad Faseeh Qureshi
2022 Wireless Communications and Mobile Computing  
A GNS3 network simulation tool is used to simulate an IPv6 network and generate ICMPv6 traffic for the dataset.  ...  Many ICMPv6-DDoS attack detection mechanisms rely on self-created datasets because very few suitable ICMPv6-DDoS attack datasets are publicly available due to privacy and security concerns.  ...  Barrera and Van Oorschot [38] , for example, used the MAWI dataset in their research to visualize IPv6 network traffic and analyse the security aspects of the IPv6 protocol.  ... 
doi:10.1155/2022/8060333 fatcat:dcv5uzlhhnadfm27dxnyeowcda

The 4th workshop on active internet measurements (AIMS-4) report

kc claffy
2012 Computer communication review  
to promote cooperative solutions and coordinated strategies to address future data needs of the network and security operations and research communities.  ...  This year we continued to focus on how measurement can illuminate two specific public policy concerns: IPv6 deployment and broadband performance.  ...  Department of Homeland Security (DHS) Science and Technology (S&T) Directorate via contracts N66001-08-C-2029 and NBCHC070133.  ... 
doi:10.1145/2317307.2317315 fatcat:s6o65nye7rahfh5hjsv6cueoja

Network Protocols, Schemes, and Mechanisms for Internet of Things (IoT): Features, Open Challenges, and Trends

Anna Triantafyllou, Panagiotis Sarigiannidis, Thomas D. Lagkas
2018 Wireless Communications and Mobile Computing  
A thorough layer-based protocol taxonomy is provided, while how the network protocols fit and operate for addressing the recent IoT requirements and applications is also illustrated.  ...  Compatibility, interoperability, and configuration issues of the existing and the emerging protocols and schemes are discussed based on the recent advanced of IPv6.  ...  Zigbee IP allows all network nodes to be individually addressed utilizing the IPv6 addressing and routing protocol.  ... 
doi:10.1155/2018/5349894 fatcat:rjeie36p5nfofko7oojqxbemci

Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities

Dileep Basam, J. Scot Ransbottom, Randy Marchany, Joseph G. Tront
2016 Journal of Electrical and Computer Engineering  
Our previous research efforts implemented a solution to identify and acquire these old addresses that are being discarded by MT6D hosts on a local network besides being able to monitor and visualize the  ...  Moving Target IPv6 Defense (MT6D) imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses.  ...  Acknowledgments The authors would like to thank Chris Morrell, Mike Cantrell, and Dr. David Raymond, Virginia Tech, for their many helpful suggestions and comments during the course of research.  ... 
doi:10.1155/2016/5212314 fatcat:uy3nccityvcsbito2og5w4fy4m

Global Telescience featuring IPv6 at iGrid2002

David Lee, Abel W. Lin, Tom Hutton, Toyokazu Akiyama, Shimojo Shinji, Fang-Pang Lin, Steven Peltier, Mark H. Ellisman
2003 Future generations computer systems  
IPv6 networks across continents, and examining IPv6 enabled mechanisms for transferring large data from two unique, remotely accessible high performance scientific instruments.  ...  As advanced instrumentation, networking, and grid computing are applied to electron tomography and biological sciences in general, much work is needed to integrate and coordinate these advanced technologies  ...  Integration of NCHC visualization tools into the Telescience environment Advanced segmentation tools based on the open source VTK toolkit, as well as advanced clientserver-based web visualization tools  ... 
doi:10.1016/s0167-739x(03)00080-3 fatcat:t6xbrevf7ngfja4wrfzhjwp4n4

Workshop report

Tanja Zseby, kc claffy
2012 Computer communication review  
associated with darkspace and unsolicited traffic analysis.  ...  On May 14-15, 2012, CAIDA hosted the first international Workshop on Darkspace and UnSolicited Traffic Analysis (DUST 2012) to provide a forum for discussion of the science, engineering, and policy challenges  ...  Acknowledgments The workshop was sponsored by NSF CRI CNS-1059439 "A Real-time Lens into Dark Address Space of the Internet" and DHS S&T contract D07PC75579 "Supporting Research and Development of Security  ... 
doi:10.1145/2378956.2378965 fatcat:szotm4fz7nbhjmlrvudwciayxy
« Previous Showing results 1 — 15 out of 2,353 results