All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Host Identity Detection in IPv6 Networks

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F14%3APU111914" target="_blank" >RIV/00216305:26230/14:PU111914 - isvavai.cz</a>

  • Result on the web

    <a href="http://link.springer.com/chapter/10.1007/978-3-662-44788-8_5" target="_blank" >http://link.springer.com/chapter/10.1007/978-3-662-44788-8_5</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.1007/978-3-662-44788-8" target="_blank" >10.1007/978-3-662-44788-8</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Host Identity Detection in IPv6 Networks

  • Original language description

    It is important to keep networks secure and reliable. In order to backtrack security incidents, provide accounting for offered services etc., it is necessary to know the identity of network users. With various methods for IPv6 address assignments, IPv6 brings new challenges to user identification in LAN. This paper proposes a new approach for tracking user identity in LANs. The approach is based on network control traffic that is already present in IPv6 networks and it is passive to end devices. In contrast to current methods, the proposed approach does not bring any extensive workload to active network devices, works in networks with Multicast Listener Discovery snooping, and is able to detect that an address is no longer used. In order to make the approach reliable, we studied the behaviour of current operating systems during IPv6 address assignments. We implemented a tool called ndtrack based on the proposed approach and tested it in real network.

  • Czech name

  • Czech description

Classification

  • Type

    D - Article in proceedings

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

    <a href="/en/project/VG20102015022" target="_blank" >VG20102015022: Modern tools for detection and mitigation of cyber criminality on the New Generation Internet</a><br>

  • Continuities

    Z - Vyzkumny zamer (s odkazem do CEZ)<br>S - Specificky vyzkum na vysokych skolach

Others

  • Publication year

    2014

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Article name in the collection

    E-Business and Telecommunications

  • ISBN

    978-3-662-44787-1

  • ISSN

    1865-0929

  • e-ISSN

  • Number of pages

    16

  • Pages from-to

    74-89

  • Publisher name

    Springer Verlag

  • Place of publication

    Berlin

  • Event location

    Reykjavik

  • Event date

    Jul 29, 2013

  • Type of event by nationality

    WRD - Celosvětová akce

  • UT code for WoS article

    000345296600005