Table 3: Comparison of the number of HTTP GET requests
per second that Honeyd 1.5c and HoneydV6 is able to han-
dle without any packet loss.
1.5c (IPv4) V6 (IPv4) V6 (IPv6)
212.57 214.00 205.75
only slightly less than its IPv4 counterpart is able to
process.
We configured HoneydV6 to simulate just a sin-
gle target for our test runs. Since Honeyd main-
tains one connection entry for each connection in a
splay tree, regardless of existing connections with
the same target address, the performance difference
between benchmarking a single target compared to
benchmarking multiple targets is insignificant.
8 CONCLUSIONS AND FUTURE
WORK
While the general threat level in IPv6 networks is still
low compared to IPv4 networks, the results of our
IPv6-darknet experiment show the raising interest of
attackers in IPv6.
The honeypot HoneydV6 presented in this paper
provides an excellent foundation for future IPv6 net-
work security research. It can be used to observe
attacks in IPv6 networks and to reveal new network
scan approaches. HoneydV6 is based on the well-
known honeypot Honeyd which is the fundamental
part of a number of honeypot solutions like Tiny
Honeypot or the SCADA HoneyNet Project. These
projects can easily be extended to IPv6 networks us-
ing HoneydV6.
HoneydV6 is the first low-interaction honeypot
which is able to simulate entire IPv6 networks. Be-
sides IPv6 packet processing, HoneydV6 implements
necessary parts of the ICMPv6 and the Neighbor Dis-
covery Protocol. In order to observe new kinds of
scanning methods in IPv6 networks, we adapted the
internal routing mechanisms of Honeyd to support
IPv6 packet routing. In our performance tests Hon-
eydV6 performed comparable to Honeyd for both,
IPv4 and IPv6 networks. Further, we developed a
mechanism that randomly and dynamically generates
low-interaction IPv6 hosts, based on the requests of
an attacker, in order to increase the chances that an
attacker will encounter the honeypot within the huge
IPv6 address space.
We are currently setting up a honeynet based on
HoneydV6 together with research partners to observe
how the threat level in IPv6 networks develops.
Honeyd still contains some features that are sup-
ported in IPv4 networks only. One example is the
operating system fingerprintingmechanism, which al-
lows Honeyd to emulate system-specific behavior. We
currently investigate how the new nmap IPv6 finger-
print format (Nmap, nd) can be reused to simulate
the network stack parameters of different operating
systems. HoneydV6 is a useful tool to deceive at-
tackers and to analyse how an attacker interacts with
network services. However, the honeypot is not able
to inspect UDP or TCP payload for malicious con-
tent which makes it hard to extract new exploits from
the received traffic. We are therefore working on a
connection between our IPv6 honeypot and the shell-
code detection library libemu (Baecher and Koetter,
nd) with the aim of simplifying remote exploit detec-
tion.
In order to promote further IPv6 research, we will
make the sources of our HoneydV6 implementation
publicly available at http://www.idsv6.de.
REFERENCES
Baecher, P. and Koetter, M. (nd). libemu x86 Shell-
code Emulation. Available from: http://libemu.
carnivore.it/.
CERT Polska (2012). ENISA Honeypot Study - Proactive
Detection of Security Incidents.
Chown, T. (2008). IPv6 Implications for Network Scan-
ning. RFC 5157 (Informational). Available from:
http://www.ietf.org/rfc/rfc5157.txt.
Clemente, P., Lalande, J.-F., and Rouzaud-Cornabas, J.
(2012). HoneyCloud: Elastic Honeypots - On-attack
Provisioning of High-Interaction Honeypots. In Inter-
national Conference on Security and Cryptography,
pages 434–439, Rome, Italy.
Dionaea (nd). dionaea catches bugs. Available from: http://
dionaea.carnivore.it/.
Ford, M., Stevens, J., and Ronan, J. (2006). Initial Results
from an IPv6 Darknet. In ICISP ’06: Proceedings of
the International Conference on Internet Surveillance
and Protection, page 13, Washington, DC, USA. IEEE
Computer Society.
Heuse, M. (nd). THC IPv6 attack tool kit. Available from:
http://www.thc.org/thc-ipv6/ [cited 09.05.2011].
Huston, G. (2010). Background Radiation in IPv6. Avail-
able from: https://labs.ripe.net/Members/mirjam/
background-radiation-in-ipv6.
Johns, M. S. (1993). Identification Protocol. RFC
1413 (Proposed Standard). Available from: http://
www.ietf.org/rfc/rfc1413.txt.
Kalt, C. (2000). Internet Relay Chat: Architec-
ture. RFC 2810 (Informational). Available from:
http://www.ietf.org/rfc/rfc2810.txt.
Nmap (nd). Nmap Network Scanning - IPv6 finger-
printing. Available from: http://nmap.org/book/
osdetect-ipv6-methods.html.
Oikarinen, J. and Reed, D. (1993). Internet Relay Chat
Protocol. RFC 1459. Updated by RFCs 2810, 2811,
SECRYPT2013-InternationalConferenceonSecurityandCryptography
96