Dynamics of abusive IPv6 networks
Approved for public release; distribution is unlimited === The exhaustion of available public IPv4 addresses has had a significant impact in an expanding, networked world and has led to increased adoption of IPv6. As IPv6 becomes more commonplace, it permits abusive and malicious parties to exploit...
Main Author: | |
---|---|
Other Authors: | |
Published: |
Monterey, California: Naval Postgraduate School
2014
|
Online Access: | http://hdl.handle.net/10945/44021 |
id |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-44021 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-nps.edu-oai-calhoun.nps.edu-10945-440212015-02-11T03:55:49Z Dynamics of abusive IPv6 networks Turner, Mark J. Beverly, Robert Deccio, Casey Computer Science Approved for public release; distribution is unlimited The exhaustion of available public IPv4 addresses has had a significant impact in an expanding, networked world and has led to increased adoption of IPv6. As IPv6 becomes more commonplace, it permits abusive and malicious parties to exploit both new and existing vulnerabilities. Among such vulnerabilities is abusive electronic messaging, or spam. To better understand the impact of spam utilizing IPv6 as its delivery protocol, this study focused on both real-world IPv6 spam collected from large production domain and IPv6 spam laboratory measurements. This study used various network traffic analysis tools to detect, classify, and associate IPv6 spamming behavior, both at the victim mail exchanger and among IPv6 wide-area routes. Furthermore, popular mail transfer agents were tested in an effort to profile their IPv6 behavior and correlate with spam obtained from the real world production domain. Results show that while IPv6 spamming behavior is growing, it is still in its infancy and no outstanding characteristics emerged that allow for definitive classification as a dominant IPv6 spamming behavior. 2014-12-05T20:10:59Z 2014-12-05T20:10:59Z 2014-09 Thesis http://hdl.handle.net/10945/44021 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California: Naval Postgraduate School |
collection |
NDLTD |
sources |
NDLTD |
description |
Approved for public release; distribution is unlimited === The exhaustion of available public IPv4 addresses has had a significant impact in an expanding, networked world and has led to increased adoption of IPv6. As IPv6 becomes more commonplace, it permits abusive and malicious parties to exploit both new and existing vulnerabilities. Among such vulnerabilities is abusive electronic messaging, or spam. To better understand the impact of spam utilizing IPv6 as its delivery protocol, this study focused on both real-world IPv6 spam collected from large production domain and IPv6 spam laboratory measurements. This study used various network traffic analysis tools to detect, classify, and associate IPv6 spamming behavior, both at the victim mail exchanger and among IPv6 wide-area routes. Furthermore, popular mail transfer agents were tested in an effort to profile their IPv6 behavior and correlate with spam obtained from the real world production domain. Results show that while IPv6 spamming behavior is growing, it is still in its infancy and no outstanding characteristics emerged that allow for definitive classification as a dominant IPv6 spamming behavior. |
author2 |
Beverly, Robert |
author_facet |
Beverly, Robert Turner, Mark J. |
author |
Turner, Mark J. |
spellingShingle |
Turner, Mark J. Dynamics of abusive IPv6 networks |
author_sort |
Turner, Mark J. |
title |
Dynamics of abusive IPv6 networks |
title_short |
Dynamics of abusive IPv6 networks |
title_full |
Dynamics of abusive IPv6 networks |
title_fullStr |
Dynamics of abusive IPv6 networks |
title_full_unstemmed |
Dynamics of abusive IPv6 networks |
title_sort |
dynamics of abusive ipv6 networks |
publisher |
Monterey, California: Naval Postgraduate School |
publishDate |
2014 |
url |
http://hdl.handle.net/10945/44021 |
work_keys_str_mv |
AT turnermarkj dynamicsofabusiveipv6networks |
_version_ |
1716730473872359424 |