作者: Bettina Schnor , Thomas Scheffler , Simon Kiertscher , Eldad Zack , Sven Schindler
DOI:
关键词: Server 、 Computer security 、 Host (network) 、 Pseudoserver 、 Exploit 、 Honeypot 、 IPv6 、 Computer network 、 Backscatter (email) 、 IPv6 address 、 Computer science
摘要: This paper starts with the presentation of results from an IPv6-darknet experiment that we conducted during summer 2012. The indicates attackers are gaining interest in IPv6 networks and appropriate security tools need to be readied. Therefore, propose HoneydV6, a low-interaction honeypot can simulate entire which may utilized detect analyze network attacks. Our implementation extends well-known Honeyd. To best our knowledge, this is first able on single host. huge address spaces requires new approaches concepts order enable find exploit honeypot. We increase chance for attacker target host by reacting attacker's requests dynamic generation instances honeynet.