On security research towards future mobile network generations

D Rupprecht, A Dabrowski, T Holz… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Over the last decades, numerous security and privacy issues in all three active mobile
network generations have been revealed that threaten users as well as network providers. In …

ICMPv6-based DoS and DDoS attacks detection using machine learning techniques, open challenges, and blockchain applicability: A review

M Tayyab, B Belaton, M Anbar - IEEE Access, 2020 - ieeexplore.ieee.org
Although the launch of Internet Protocol version six (IPv6) addressed the issue of IPv4's
address depletion, but also mandated the use of Internet Control Message Protocol version …

Fast IPv6 network periphery discovery and security implications

X Li, B Liu, X Zheng, H Duan, Q Li… - 2021 51st Annual IEEE …, 2021 - ieeexplore.ieee.org
Numerous measurement researches have been performed to discover the IPv4 network
security issues by leveraging the fast Internet-wide scanning techniques. However, IPv6 …

[PDF][PDF] Don't forget to lock the back door! A characterization of IPv6 network security policy

J Czyz, M Luckie, M Allman… - Network and Distributed …, 2016 - ndss-symposium.org
There is growing operational awareness of the challenges in securely operating IPv6
networks. Through a measurement study of 520,000 dual-stack servers and 25,000 dual …

A survey of key technologies for constructing network covert channel

J Tian, G **ong, Z Li, G Gou - Security and Communication …, 2020 - Wiley Online Library
In order to protect user privacy or guarantee free access to the Internet, the network covert
channel has become a hot research topic. It refers to an information channel in which the …

On reconnaissance with IPv6: a pattern-based scanning approach

J Ullrich, P Kieseberg, K Krombholz… - 2015 10th International …, 2015 - ieeexplore.ieee.org
Today's capability of fast Internet-wide scanning allows insights into the Internet ecosystem,
but the on-going transition to the new Internet Protocol version 6 (IPv6) makes the approach …

Detecting man-in-the-middle attacks

V Vissamsetty, M Lakshmanan, SS Penupolu… - US Patent …, 2019 - Google Patents
MITM attacks are detected by intercepting network con figuration traffic (name resolution,
DHCP, ARP, ICMP, etc.) in order to obtain a description of network components. A computer …

IPv6 covert channels in the wild

W Mazurczyk, K Powójski, L Caviglione - Proceedings of the third central …, 2019 - dl.acm.org
The increasing diffusion of malware endowed with steganographic techniques requires to
carefully identify and evaluate a new set of threats. The creation of a covert channel to hide a …

{MobileAtlas}: Geographically Decoupled Measurements in Cellular Networks for Security and Privacy Research

GK Gegenhuber, W Mayer, E Weippl… - 32nd USENIX Security …, 2023 - usenix.org
Cellular networks are not merely data access networks to the Internet. Their distinct services
and ability to form large complex compounds for roaming purposes make them an attractive …

Predictability of IP address allocations for cloud computing platforms

HMJ Almohri, LT Watson… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
One way to combat denial-of-service attacks on cloud-based virtual networks is to use
unpredictable network addresses, aiming to increase attacker effort by requiring attackers to …