IP hopping by mobile IPv6

Vahid Heydari

Research output: Chapter in Book/Report/Conference proceedingChapter


Remote cyberattacks can be started from unlimited distance. These remote attacks include special actions which allow attackers to compromise remote systems. During the first step of attacks, reconnaissance step, attackers attempt to gather information about their intended target(s). For network-based systems, figuring out the IP address(es) of the target(s) is critical to the success of the attack. There are several countermeasures to protect systems from these attacks such as firewalls and intrusion detection and prevention systems (IDPS). Unfortunately, zero-day exploits that use undisclosed or uncorrected computer application vulnerabilities can defeat the best firewalls and IDPSs. Regardless of the strength of these countermeasures used in practice, the use of static IP addresses leaves the target vulnerable in two ways. First, they are discoverable. Second, after accessing the target, the attacker can maintain this access for a long time. So, an effective defense is a mechanism to change the IP addresses randomly and dynamically (IP hopping). These mechanisms are called moving target defenses (MTDs). In this chapter, some novel methods based on IPv6 (and Mobile IPv6) are explained to thwart remote attacks by randomly changing the IP address(es) of the target(s).

Original languageEnglish (US)
Title of host publicationHandbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense
PublisherSpringer International Publishing
Number of pages28
ISBN (Electronic)9783319090696
ISBN (Print)9783319090689
StatePublished - Oct 5 2018
Externally publishedYes

All Science Journal Classification (ASJC) codes

  • General Computer Science
  • General Economics, Econometrics and Finance
  • General Business, Management and Accounting
  • General Social Sciences


Dive into the research topics of 'IP hopping by mobile IPv6'. Together they form a unique fingerprint.

Cite this