Dynamics of abusive IPv6 networks

Approved for public release; distribution is unlimited === The exhaustion of available public IPv4 addresses has had a significant impact in an expanding, networked world and has led to increased adoption of IPv6. As IPv6 becomes more commonplace, it permits abusive and malicious parties to exploit...

Full description

Bibliographic Details
Main Author: Turner, Mark J.
Other Authors: Beverly, Robert
Published: Monterey, California: Naval Postgraduate School 2014
Online Access:http://hdl.handle.net/10945/44021
id ndltd-nps.edu-oai-calhoun.nps.edu-10945-44021
record_format oai_dc
spelling ndltd-nps.edu-oai-calhoun.nps.edu-10945-440212015-02-11T03:55:49Z Dynamics of abusive IPv6 networks Turner, Mark J. Beverly, Robert Deccio, Casey Computer Science Approved for public release; distribution is unlimited The exhaustion of available public IPv4 addresses has had a significant impact in an expanding, networked world and has led to increased adoption of IPv6. As IPv6 becomes more commonplace, it permits abusive and malicious parties to exploit both new and existing vulnerabilities. Among such vulnerabilities is abusive electronic messaging, or spam. To better understand the impact of spam utilizing IPv6 as its delivery protocol, this study focused on both real-world IPv6 spam collected from large production domain and IPv6 spam laboratory measurements. This study used various network traffic analysis tools to detect, classify, and associate IPv6 spamming behavior, both at the victim mail exchanger and among IPv6 wide-area routes. Furthermore, popular mail transfer agents were tested in an effort to profile their IPv6 behavior and correlate with spam obtained from the real world production domain. Results show that while IPv6 spamming behavior is growing, it is still in its infancy and no outstanding characteristics emerged that allow for definitive classification as a dominant IPv6 spamming behavior. 2014-12-05T20:10:59Z 2014-12-05T20:10:59Z 2014-09 Thesis http://hdl.handle.net/10945/44021 This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, it may not be copyrighted. Monterey, California: Naval Postgraduate School
collection NDLTD
sources NDLTD
description Approved for public release; distribution is unlimited === The exhaustion of available public IPv4 addresses has had a significant impact in an expanding, networked world and has led to increased adoption of IPv6. As IPv6 becomes more commonplace, it permits abusive and malicious parties to exploit both new and existing vulnerabilities. Among such vulnerabilities is abusive electronic messaging, or spam. To better understand the impact of spam utilizing IPv6 as its delivery protocol, this study focused on both real-world IPv6 spam collected from large production domain and IPv6 spam laboratory measurements. This study used various network traffic analysis tools to detect, classify, and associate IPv6 spamming behavior, both at the victim mail exchanger and among IPv6 wide-area routes. Furthermore, popular mail transfer agents were tested in an effort to profile their IPv6 behavior and correlate with spam obtained from the real world production domain. Results show that while IPv6 spamming behavior is growing, it is still in its infancy and no outstanding characteristics emerged that allow for definitive classification as a dominant IPv6 spamming behavior.
author2 Beverly, Robert
author_facet Beverly, Robert
Turner, Mark J.
author Turner, Mark J.
spellingShingle Turner, Mark J.
Dynamics of abusive IPv6 networks
author_sort Turner, Mark J.
title Dynamics of abusive IPv6 networks
title_short Dynamics of abusive IPv6 networks
title_full Dynamics of abusive IPv6 networks
title_fullStr Dynamics of abusive IPv6 networks
title_full_unstemmed Dynamics of abusive IPv6 networks
title_sort dynamics of abusive ipv6 networks
publisher Monterey, California: Naval Postgraduate School
publishDate 2014
url http://hdl.handle.net/10945/44021
work_keys_str_mv AT turnermarkj dynamicsofabusiveipv6networks
_version_ 1716730473872359424