Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities

dc.contributor.authorBasam, Dileepen
dc.contributor.authorRansbottom, J. Scoten
dc.contributor.authorMarchany, Randolph C.en
dc.contributor.authorTront, Joseph G.en
dc.contributor.departmentComputer Scienceen
dc.date.accessioned2017-09-18T09:38:25Zen
dc.date.available2017-09-18T09:38:25Zen
dc.date.issued2016-04-20en
dc.date.updated2017-09-18T09:38:25Zen
dc.description.abstractMoving Target IPv6 Defense (MT6D) imparts radio-frequency hopping behavior to IPv6 networks by having participating nodes periodically hop onto new addresses while giving up old addresses. Our previous research efforts implemented a solution to identify and acquire these old addresses that are being discarded by MT6D hosts on a local network besides being able to monitor and visualize the incoming traffic on these addresses. This was essentially equivalent to forming a darknet out of the discarded MT6D addresses, but the solution presented in the previous research effort did not include database integration for it to scale and be extended. This paper presents a solution with a new architecture that not only extends the previous solution in terms of automation and database integration but also demonstrates the ability to deploy a honeypot on a virtual LXC (Linux Container) on-demand based on any interesting traffic pattern observed on a discarded address. The proposed architecture also allows an MT6D host to query the solution database for network activity on its relinquished addresses as a JavaScript Object Notation (JSON) object. This allows an MT6D host to identify suspicious activity on its discarded addresses and strengthen the MT6D scheme parameters accordingly. We have built a proof-of-concept for the proposed solution and analyzed the solution’s feasibility and scalability.en
dc.description.versionPublished versionen
dc.format.mimetypeapplication/pdfen
dc.identifier.citationDileep Basam, J. Scot Ransbottom, Randy Marchany, and Joseph G. Tront, “Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities,” Journal of Electrical and Computer Engineering, vol. 2016, Article ID 5212314, 13 pages, 2016. doi:10.1155/2016/5212314en
dc.identifier.doihttps://doi.org/10.1155/2016/5212314en
dc.identifier.urihttp://hdl.handle.net/10919/78943en
dc.language.isoenen
dc.publisherHindawien
dc.rightsCreative Commons Attribution 4.0 Internationalen
dc.rights.holderCopyright © 2016 Dileep Basam et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.en
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/en
dc.titleStrengthening MT6D Defenses with LXC-Based Honeypot Capabilitiesen
dc.title.serialJournal of Electrical and Computer Engineeringen
dc.typeArticle - Refereeden
dc.type.dcmitypeTexten
Files
Original bundle
Now showing 1 - 2 of 2
Name:
JECE.2016.5212314.xml
Size:
5.14 KB
Format:
Extensible Markup Language
Loading...
Thumbnail Image
Name:
JECE.2016.5212314.pdf
Size:
2.38 MB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
1.5 KB
Format:
Item-specific license agreed upon to submission
Description: