IP hopping by mobile IPv6

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Remote cyberattacks can be started from unlimited distance. These remote attacks include special actions which allow attackers to compromise remote systems. During the first step of attacks, reconnaissance step, attackers attempt to gather information about their intended target(s). For network-based systems, figuring out the IP address(es) of the target(s) is critical to the success of the attack. There are several countermeasures to protect systems from these attacks such as firewalls and intrusion detection and prevention systems (IDPS). Unfortunately, zero-day exploits that use undisclosed or uncorrected computer application vulnerabilities can defeat the best firewalls and IDPSs. Regardless of the strength of these countermeasures used in practice, the use of static IP addresses leaves the target vulnerable in two ways. First, they are discoverable. Second, after accessing the target, the attacker can maintain this access for a long time. So, an effective defense is a mechanism to change the IP addresses randomly and dynamically (IP hopping). These mechanisms are called moving target defenses (MTDs). In this chapter, some novel methods based on IPv6 (and Mobile IPv6) are explained to thwart remote attacks by randomly changing the IP address(es) of the target(s).

Original languageEnglish (US)
Title of host publicationHandbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense
PublisherSpringer International Publishing
Pages983-1010
Number of pages28
ISBN (Electronic)9783319090696
ISBN (Print)9783319090689
DOIs
StatePublished - Oct 5 2018

All Science Journal Classification (ASJC) codes

  • Social Sciences(all)
  • Computer Science(all)
  • Economics, Econometrics and Finance(all)
  • Business, Management and Accounting(all)

Fingerprint Dive into the research topics of 'IP hopping by mobile IPv6'. Together they form a unique fingerprint.

  • Cite this

    Heydari, V. (2018). IP hopping by mobile IPv6. In Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense (pp. 983-1010). Springer International Publishing. https://doi.org/10.1007/978-3-319-09069-6_49