Results 1 to 10 of about 68,338 (318)

Rusty Clusters? Dusting an IPv6 Research Foundation [PDF]

open access: yesACM/SIGCOMM Internet Measurement Conference, 2022
The long-running IPv6 Hitlist service is an important foundation for IPv6 measurement studies. It helps to overcome infeasible, complete address space scans by collecting valuable, unbiased IPv6 address candidates and regularly testing their responsiveness.
Johannes Zirngibl   +4 more
arxiv   +3 more sources

Temporal and Spatial Classification of Active IPv6 Addresses [PDF]

open access: yes, 2015
There is striking volume of World-Wide Web activity on IPv6 today. In early 2015, one large Content Distribution Network handles 50 billion IPv6 requests per day from hundreds of millions of IPv6 client addresses; billions of unique client addresses are observed per month.
Berger, Arthur, Plonka, David
arxiv   +3 more sources

Match-Prevention Technique Against Denial-of-Service Attack on Address Resolution and Duplicate Address Detection Processes in IPv6 Link-Local Network

open access: yesIEEE Access, 2020
Address Resolution (AR) and Duplicate Address Detection (DAD) are considered the most important processes in Neighbour Discovery Protocol (NDP), which occurs frequently from each Internet Protocol version 6 (IPv6) host communicating with other ...
Ahmed K. Al-Ani   +3 more
doaj   +2 more sources

Discovering the IPv6 Network Periphery [PDF]

open access: yesarXiv, 2020
We consider the problem of discovering the IPv6 network periphery, i.e., the last hop router connecting endhosts in the IPv6 Internet. Finding the IPv6 periphery using active probing is challenging due to the IPv6 address space size, wide variety of provider addressing and subnetting schemes, and incomplete topology traces.
Erik C. Rye, Robert Beverly
arxiv   +2 more sources

Clusters in the Expanse: Understanding and Unbiasing IPv6 Hitlists [PDF]

open access: yesProceedings of the 2018 Internet Measurement Conference (IMC '18), 2018
Network measurements are an important tool in understanding the Internet. Due to the expanse of the IPv6 address space, exhaustive scans as in IPv4 are not possible for IPv6. In recent years, several studies have proposed the use of target lists of IPv6 addresses, called IPv6 hitlists.
Oliver Gasser   +7 more
arxiv   +3 more sources

Phase Changes in the Evolution of the IPv4 and IPv6 AS-Level Internet Topologies [PDF]

open access: yes, 2010
In this paper we investigate the evolution of the IPv4 and IPv6 Internet topologies at the autonomous system (AS) level over a long period of time.We provide abundant empirical evidence that there is a phase transition in the growth trend of the two networks. For the IPv4 network, the phase change occurred in 2001.
Albert   +25 more
arxiv   +5 more sources

An API for IPv6 Multihoming [PDF]

open access: yes, 2006
IFIP International Workshop on Networked Applications, Colmenarejo, Madrid/Spain, 6?8 July, 2005This paper proposes an API for Multihoming in IPv6. This API is based on the Hash Based Addresses and Cryptographically Generated Addresses approaches, which ...
Bagnulo Braun, Marcelo Gabriel   +2 more
core   +4 more sources

Hybrid rule-based botnet detection approach using machine learning for analysing DNS traffic [PDF]

open access: yesPeerJ Computer Science, 2021
Botnets can simultaneously control millions of Internet-connected devices to launch damaging cyber-attacks that pose significant threats to the Internet. In a botnet, bot-masters communicate with the command and control server using various communication
Saif Al-mashhadi   +3 more
doaj   +2 more sources

One bad apple can spoil your IPv6 privacy [PDF]

open access: yesComputer communication review, 2022
IPv6 is being more and more adopted, in part to facilitate the millions of smart devices that have already been installed at home. Unfortunately, we find that the privacy of a substantial fraction of end-users is still at risk, despite the efforts by ...
Said Jawad Saidi   +2 more
semanticscholar   +1 more source

6GAN: IPv6 Multi-Pattern Target Generation via Generative Adversarial Nets with Reinforcement Learning [PDF]

open access: yesIEEE Conference on Computer Communications, 2021
Global IPv6 scanning has always been a challenge for researchers because of the limited network speed and computational power. Target generation algorithms are recently proposed to overcome the problem for Internet assessments by predicting a candidate ...
Tianyu Cui   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy