{IPv6} security: Attacks and countermeasures in a nutshell

J Ullrich, K Krombholz, H Hobel, A Dabrowski… - 8th USENIX Workshop …, 2014 - usenix.org
The history of computers is full of underestimation: 640 kilobyte, 2-digit years, and 32-bit
Internet addresses. IPv6 was invented to overcome the latter as well as to revise other …

Saving Brian's privacy: the perils of privacy exposure through reverse DNS

O van der Toorn, R van Rijswijk-Deij… - Proceedings of the …, 2022 - dl.acm.org
Given the importance of privacy, many Internet protocols are nowadays designed with
privacy in mind (eg, using TLS for confidentiality). Foreseeing all privacy issues at the time of …

Secure DHCPv6 mechanism for DHCPv6 security and privacy protection

L Li, G Ren, Y Liu, J Wu - Tsinghua Science and Technology, 2018 - ieeexplore.ieee.org
With the rapid developmen of the Internet, the exhaustion of IPv4 address limited the
development of the Internet for years. IPv6, as the core technology of the next generation …

Implementing an IPv6 moving target defense on a live network

M Dunlop, S Groat, RC Marchany, JG Tront - 2012 - vtechworks.lib.vt.edu
The goal of our research is to protect sensitive communications, which are commonly used
by government agencies, from eavesdroppers or social engineers. In prior work, we …

A new approach for detection of host identity in IPv6 networks

L Polčák, M Holkovič… - … Conference on Data …, 2013 - ieeexplore.ieee.org
For security, management and accounting, network administrators benefit from knowledge of
IP and MAC address bindings. In IPv6, learning these bindings is not as straightforward as it …

Optimizing a network layer moving target defense by translating software from python to c

OR Hardman - 2016 - vtechworks.lib.vt.edu
The security of powerful systems and large networks is often addressed through complex
defenses. While these types of defenses offer increased security, they are resource intensive …

Achieving Security and Privacy in the Internet Protocol Version 6 Through the Use of Dynamically Obscured Addresses

MW Dunlop - 2012 - vtechworks.lib.vt.edu
Society's increased use of network applications, such as email, social networking, and web
browsing, creates a massive amount of information floating around in cyber space. An …

Host Identity Detection in IPv6 Networks

L Polčák, M Holkovič, P Matoušek - … 2013, Reykjavik, Iceland, July 29-31 …, 2014 - Springer
It is important to keep networks secure and reliable. In order to backtrack security incidents,
provide accounting for offered services etc., it is necessary to know the identity of network …

[PDF][PDF] Lawful interception: identity detection

L Polčák - 2017 - theses.cz
Internet has became a regular communication channel between law offenders performing
malicious activities. Courts or prosecutors authorise lawful interception that targets individual …

[PDF][PDF] Challenges in identification in future computer networks

L Polčák - ICETE 2014 Doctoral Consortium, 2014 - scitepress.org
The knowledge of user identity is a necessity for many network-related tasks, eg network
management (Grégr et al., 2011), security incident backtracking (Scarfone et al., 2008) …