Honeypot architectures for IPv6 networks
نویسنده
چکیده
The decrease of available IPv4 addresses and the requirement for new features demands Internet service providers to deploy IPv6 networks. It is not a question of if, but when new network attacks will appear, which target the comparatively new network protocol. Virtual honeypots provide an important tool for the observation of assaults in computer networks. In contrast to intrusion detection systems, honeypots interact with an attacker and therefore allow the creation of fine-grained evaluations of attack sequences. This thesis focuses on honeypot architectures which are specialized in the observation of IPv6 network attacks. A survey of existing honeypot solutions reveals a need for IPv6-specific honeypots with support for large IPv6 address spaces. Long-term observations of two different darknets prove that IPv6 networks are not free of unintended activity. Large-scale network scans search through vast and unforeseeable address ranges to find and explore new IPv6-enabled hosts. This thesis proposes two different honeypot architectures and presents the corresponding prototype implementations, called Honeydv6 and Hyhoneydv6, to overcome the need for IPv6 honeypot solutions. Honeydv6 is a low-interaction honeypot which is able to simulate entire IPv6 networks to efficiently observe network scan approaches and assaults. It extends the well-known low-interaction honeypot solution Honeyd with a custom IPv6 stack and a new dynamic honeypot instantiation mechanism. The utilization of a custom network stack implementation allows Honeydv6 to simulate multiple hosts with different IPv6 addresses on a single host and to observe even low-level IPv6 attacks, such as assaults to the IPv6 fragmentation mechanism. The dynamic instantiation mechanism spawns new low-interaction honeypots on-demand based on attackers’ destinations. This approach allows Honeydv6 to cover large IPv6 address spaces and to respond to attacks that target arbitrary IPv6 address ranges. Low-interaction honeypots only simulate network services up to a certain degree of granularity. For complex attack scenarios where authentic network services are a requirement, lowinteraction honeypots may not suffice and a deployment of high-interaction honeypots becomes necessary. However, the vast IPv6 address space makes classical high-interaction honeypot deployment strategies impossible and new architectural approaches are required. Hyhoneydv6 was designed to efficiently allow the deployment of high-interaction honeypots in IPv6 networks. In contrast to Honeydv6, Hyhoneydv6 is a hybrid honeypot framework which includes a combination of lowand virtual machine-based high-interaction honeypots. Low-interaction honeypots in the Hyhoneydv6 architecture process network scans and attacks to less complex network services. High-interaction honeypots focus on the processing of attacks to complex and proprietary network services. The Hyhoneydv6 architecture includes a newly developed proxy mechanism which allows to transparently forward attackers from lowto high-interaction honeypots. Hyhoneydv6 adapts the dynamic low-interaction honeypot instantiation mechanism of Honeydv6 to dynamically deploy high-interaction honeypots. This includes an on-demand address reconfiguration of high-interaction honeypot instances. The performance measurements of the Honeydv6 and the Hyhoneydv6 prototype implementation show that both architectures do not rely on expensive infrastructures and can be run on off-the-shelf hardware.
منابع مشابه
Hyhoneydv6: A hybrid Honeypot Architecture for IPv6 Networks
This paper presents a new hybrid honeypot archi-tecture which focuses on the coverage of large IPv6 address spaces. Results from a 15-months darknet experiment verify that attackers and researchers utilise various approaches to scan wide and unforeseeable IPv6 address ranges which cannot be managed with current honeypot solutions. The huge IPv6 address space not only makes it hard for attackers...
متن کاملAn Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation
Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...
متن کاملWireless Honeypot: Framework, Architectures and Tools
Even though a spectrum of security solutions exists, the lack of knowledge about the exploitation methods used to compromise wireless networks is threatening the free and easy usage of wireless technologies in commercial world. Wireless Honeypot has come up as a recent solution to evaluate and assess the security in wireless environment at different layers. This paper surveys a range of wireles...
متن کاملSecured Route Optimization and Micro-mobility with Enhanced Handover Scheme in Mobile IPv6 Networks
خسارات وارد شده به شبکه گاز شهری در یک زلزله میتواند زیانهای زیادی از جمله خسارت ناشی از آتشسوزی در شبکه زیر ساخت، و خسارت ناشی از قطع خدمات رسانی، تعمیر و تعویض اعضای شبکه، را در بر داشته باشد. در این مقاله یک مدل آتشسوزی پیشنهاد شده است. مدل پیشنهادی در یک مدل نیمه احتمالاتی مرسوم برای برآورد خسارتهای مختلف ناشی از آسیب دیدن شبکه گاز شهری، به کار برده شده است. هدف از این کار توسعه یک ابز...
متن کاملIoTPOT: A Novel Honeypot for Revealing Current IoT Threats
We analyze the increasing threats against IoT devices. We show that Telnet-based attacks that target IoT devices have rocketed since 2014. Based on this observation, we propose an IoT honeypot and sandbox, which attracts and analyzes Telnet-based attacks against various IoT devices running on different CPU architectures such as ARM, MIPS, and PPC. By analyzing the observation results of our hon...
متن کامل