Abstract

IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet. While IPv6 has brought excellent convenience to the public, related security issues have gradually emerged, and an assessment of the security situation in IPv6 has also become more important. Unlike passive defense, the honeypot is a security device for active defense. The real network application and the fake network application, disguised by the honeypot, are located on a similar subnet, and provide a network application service; but, in both cases, behavior logs from unauthorized users are caught. In this manner, and to protect web-based applications from attacks, this article introduces the design and implementation of a web-based honeypot that includes a weak password module and an SQL inject module, which supports the IPv6 network to capture unauthorized access behavior. We also propose the Security Situation Index (SSI), which can measure the security situation of the network application environment. The value of SSI is established according to the different parameters that are based on honeypots. There is a firewall outside the test system environment, so the obtained data should be used as the real invasion data, and the captured behavior is not a false positive. Threats can be spotted smartly by deploying honeypots; this paper demonstrates that the honeypot is an excellent method of capturing malicious requests and can be measured with the SSI of the whole system. According to the information, the administrator can modify the current security policy, which can improve the security level of a whole IPv6 network system.

Highlights

  • We are entering the all-digital society of the Internet of Everything, where the number of communication entities is exponentially increasing; but, except for computers and mobile phones, all smart devices are assigned an IP [1]

  • A.; Ghafoor, A. et al [26] propose an approach for conformance testing of implementations required to enforce access control policies specified using the Temporal Role-Based Access Control (TRBAC) model

  • We present a group of honeypots to get the index of network security situation and detect the whole security level of the network

Read more

Summary

Introduction

We are entering the all-digital society of the Internet of Everything, where the number of communication entities is exponentially increasing; but, except for computers and mobile phones, all smart devices are assigned an IP [1]. Infinite IP addresses allow IPv6 to accommodate a large number of devices [2] Together with technologies such as 5G, it will support the rapid development of emerging technologies such as mobile Internet, Internet of Things, industrial Internet, cloud computing, big data, and artificial intelligence to effectively meet new demands for future business. The main contribution of this paper is to create a web-based honeypot in the IPv6 environment and provide its Security Situation Index (SSI) to measure the Situation Awareness of the network. This paper adopts honeypot technology to capture the behavior of intrusion detection and realizes IPv6 security situation awareness. A multi-honeypot system is deployed in the system for network security situation awareness, attracting and transferring attacks from illegal users, confusing the attacker, wasting their time and traffic attacks, and collecting data on the behavior and characteristics of the attacker. It is possible to achieve a measure of security awareness and defensive implementation

Security Situation Awareness
Honeypot and IPv6
Access Control and Security Issues in IPv6
Design of a Honeypot-Based IPv6 System
Fake Website Logs
Weak Password Website Module in the Honeypot
SQL Injection Website Module in the Honeypot
Index of Security
Experiment and Discussions
Honeypot Situation Awareness Parts
The Index of Security Situation Awareness
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.