HoneydV6: A Low-interaction IPv6 Honeypot

Sven Schindler, Bettina Schnor, Simon Kiertscher, Thomas Scheffler, Eldad Zack




  1. Baecher, P. and Koetter, M. (nd). libemu x86 Shellcode Emulation. Available from: http://libemu. carnivore.it/.
  2. CERT Polska (2012). ENISA Honeypot Study - Proactive Detection of Security Incidents.
  3. Chown, T. (2008). IPv6 Implications for Network Scanning. RFC 5157 (Informational). Available from: http://www.ietf.org/rfc/rfc5157.txt.
  4. Clemente, P., Lalande, J.-F., and Rouzaud-Cornabas, J. (2012). HoneyCloud: Elastic Honeypots - On-attack Provisioning of High-Interaction Honeypots. In International Conference on Security and Cryptography, pages 434-439, Rome, Italy.
  5. Ford, M., Stevens, J., and Ronan, J. (2006). Initial Results from an IPv6 Darknet. In ICISP 7806: Proceedings of the International Conference on Internet Surveillance and Protection, page 13, Washington, DC, USA. IEEE Computer Society.
  6. Heuse, M. (nd). THC IPv6 attack tool kit. Available from: http://www.thc.org/thc-ipv6/ [cited 09.05.2011].
  7. Huston, G. (2010). Background Radiation in IPv6. Available from: https://labs.ripe.net/Members/mirjam/ background-radiation-in-ipv6.
  8. Johns, M. S. (1993). Identification Protocol. RFC 1413 (Proposed Standard). Available from: http:// www.ietf.org/rfc/rfc1413.txt.
  9. Kalt, C. (2000). Internet Relay Chat: Architecture. RFC 2810 (Informational). Available from: http://www.ietf.org/rfc/rfc2810.txt.
  10. Nmap (nd). Nmap Network Scanning - IPv6 fingerprinting. Available from: http://nmap.org/book/ osdetect-ipv6-methods.html.
  11. Oikarinen, J. and Reed, D. (1993). Internet Relay Chat Protocol. RFC 1459. Updated by RFCs 2810, 2811, 2812, 2813. Available from: http://www.ietf.org/rfc/ rfc1459.txt.
  12. Pang, R., Yegneswaran, V., Barford, P., Paxson, V., and Peterson, L. (2004). Characteristics of internet background radiation. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, IMC 7804, pages 27-40, New York, NY, USA. ACM.
  13. Provos, N. (2003). Honeyd: A Virtual Honeypot Daemon. Technical report, Center for Information Technology Integration, University of Michigan.
  14. Provos, N. and Holz, T. (2008). Virtual Honeypots - From Botnet Tracking to Intrusion Detection. AddisonWesley.
  15. Seifert, C., Welch, I., and Komisarczuk, P. (2006). Taxonomy of honeypots. Technical report, Victoria University of Wellington, Wellington.
  16. SI6 Networks (2012). SI6 Networks' IPv6 Toolkit - A security assessment and troubleshooting tool for the IPv6 protocols. Available from: http:// www.si6networks.com/tools/ipv6toolkit.
  17. Sleator, D. D. and Tarjan, R. E. (1985). Self-adjusting binary search trees. J. ACM, 32(3):652-686. Available from: http://doi.acm.org/10.1145/3828.3835.
  18. Thomson, S., Narten, T., and Jinmei, T. (2007). IPv6 Stateless Address Autoconfiguration. RFC 4862, Internet Engineering Task Force. Available from: http://tools.ietf.org/html/rfc4862.
  19. Vrable, M., Ma, J., Chen, J., Moore, D., Vandekieft, E., Snoeren, A. C., Voelker, G. M., and Savage, S. (2005). Scalability, Fidelity, and Containment in the Potemkin Virtual Honeyfarm. In Proceedings of the twentieth ACM symposium on Operating systems principles, SOSP 7805, pages 148-162, New York, NY, USA. ACM.
  20. Zinke, J., Habenschu├č, J., and Schnor, B. (2012). servload: Generating Representative Workloads for Web Server Benchmarking. In International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECT), Genoa.

Paper Citation

in Harvard Style

Schindler S., Schnor B., Kiertscher S., Scheffler T. and Zack E. (2013). HoneydV6: A Low-interaction IPv6 Honeypot . In Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013) ISBN 978-989-8565-73-0, pages 86-97. DOI: 10.5220/0004515100860097

in Bibtex Style

author={Sven Schindler and Bettina Schnor and Simon Kiertscher and Thomas Scheffler and Eldad Zack},
title={HoneydV6: A Low-interaction IPv6 Honeypot},
booktitle={Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)},

in EndNote Style

JO - Proceedings of the 10th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2013)
TI - HoneydV6: A Low-interaction IPv6 Honeypot
SN - 978-989-8565-73-0
AU - Schindler S.
AU - Schnor B.
AU - Kiertscher S.
AU - Scheffler T.
AU - Zack E.
PY - 2013
SP - 86
EP - 97
DO - 10.5220/0004515100860097