{"id":"https://openalex.org/W2291080650","doi":"https://doi.org/10.1109/worldcis.2015.7359425","title":"Taming the Ipv6 address space with hyhoneydv6","display_name":"Taming the Ipv6 address space with hyhoneydv6","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2291080650","doi":"https://doi.org/10.1109/worldcis.2015.7359425","mag":"2291080650"},"language":"en","primary_location":{"id":"doi:10.1109/worldcis.2015.7359425","is_oa":false,"landing_page_url":"https://doi.org/10.1109/worldcis.2015.7359425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 World Congress on Internet Security (WorldCIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5022851675","display_name":"Sven Schindler","orcid":null},"institutions":[{"id":"https://openalex.org/I176453806","display_name":"University of Potsdam","ror":"https://ror.org/03bnmw459","country_code":"DE","type":"education","lineage":["https://openalex.org/I176453806"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sven Schindler","raw_affiliation_strings":["Department of Computer Science, University of Potsdam, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Potsdam, Germany","institution_ids":["https://openalex.org/I176453806"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044374029","display_name":"Bettina Schnor","orcid":"https://orcid.org/0000-0001-7369-8057"},"institutions":[{"id":"https://openalex.org/I176453806","display_name":"University of Potsdam","ror":"https://ror.org/03bnmw459","country_code":"DE","type":"education","lineage":["https://openalex.org/I176453806"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Bettina Schnor","raw_affiliation_strings":["Department of Computer Science, University of Potsdam, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Potsdam, Germany","institution_ids":["https://openalex.org/I176453806"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089880640","display_name":"Thomas Scheffler","orcid":null},"institutions":[{"id":"https://openalex.org/I129643931","display_name":"Berliner Hochschule f\u00fcr Technik","ror":"https://ror.org/00w7whj55","country_code":"DE","type":"education","lineage":["https://openalex.org/I129643931"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Thomas Scheffler","raw_affiliation_strings":["Department of Electrical Engineering Beuth Hochschule, Berlin, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering Beuth Hochschule, Berlin, Germany","institution_ids":["https://openalex.org/I129643931"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5022851675"],"corresponding_institution_ids":["https://openalex.org/I176453806"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.17156518,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"456","issue":null,"first_page":"113","last_page":"118"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10651","display_name":"IPv6, Mobility, Handover, Networks, Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9740227460861206},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.8371720314025879},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7577637434005737},{"id":"https://openalex.org/keywords/address-space","display_name":"Address space","score":0.6614913940429688},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.541812539100647},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.5292975902557373},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4712893068790436},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.43292149901390076},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3804417550563812},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.21730297803878784},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09320703148841858}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9740227460861206},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.8371720314025879},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7577637434005737},{"id":"https://openalex.org/C144240696","wikidata":"https://www.wikidata.org/wiki/Q367204","display_name":"Address space","level":2,"score":0.6614913940429688},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.541812539100647},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.5292975902557373},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4712893068790436},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.43292149901390076},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3804417550563812},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.21730297803878784},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09320703148841858},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/worldcis.2015.7359425","is_oa":false,"landing_page_url":"https://doi.org/10.1109/worldcis.2015.7359425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 World Congress on Internet Security (WorldCIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5600000023841858,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W146660932","https://openalex.org/W284347760","https://openalex.org/W1522250664","https://openalex.org/W1573594453","https://openalex.org/W1860279076","https://openalex.org/W2089989764","https://openalex.org/W2114506273","https://openalex.org/W2128962932","https://openalex.org/W2133217855","https://openalex.org/W2156640967","https://openalex.org/W2185536772","https://openalex.org/W2245372675","https://openalex.org/W2297307748","https://openalex.org/W4238295504","https://openalex.org/W6610362903","https://openalex.org/W6631155369","https://openalex.org/W6639095673","https://openalex.org/W6678956557","https://openalex.org/W6682950460"],"related_works":["https://openalex.org/W2044073281","https://openalex.org/W3003338380","https://openalex.org/W2117802452","https://openalex.org/W2185536772","https://openalex.org/W2394410790","https://openalex.org/W2353378167","https://openalex.org/W1985066306","https://openalex.org/W139113887","https://openalex.org/W2903735461","https://openalex.org/W2110353353"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,20,70],"new":[4,101],"hybrid":[5],"honeypot":[6,46,71],"architecture":[7],"which":[8,40],"focuses":[9],"on":[10,116,137],"the":[11,83,96,120,132],"coverage":[12],"of":[13,85,95],"large":[14,93],"IPv6":[15,37,50,97],"address":[16,38,51,98],"spaces.":[17],"Results":[18],"from":[19,112],"15-months":[21],"darknet":[22],"experiment":[23],"verify":[24],"that":[25,90,131],"attackers":[26,59],"and":[27,35,109,140],"researchers":[28],"utilise":[29],"various":[30],"approaches":[31],"to":[32,60,72,106,118],"scan":[33],"wide":[34],"unforeseeable":[36],"ranges":[39],"cannot":[41],"be":[42],"managed":[43],"with":[44,126],"current":[45],"solutions.":[47],"The":[48],"huge":[49],"space":[52],"not":[53],"only":[54],"makes":[55,66],"it":[56,64,67],"hard":[57],"for":[58,69],"find":[61],"target":[62],"hosts,":[63],"also":[65],"difficult":[68],"get":[73],"found":[74],"by":[75],"an":[76],"attacker.":[77],"We":[78],"solve":[79],"this":[80],"challenge":[81],"through":[82],"use":[84],"dynamically":[86],"configured":[87],"high-interaction":[88,114],"honeypots":[89,115],"can":[91],"cover":[92],"chunks":[94],"space.":[99],"A":[100],"proxy":[102],"mechanism":[103],"is":[104],"used":[105],"transparently":[107],"handover":[108],"forward":[110],"traffic":[111],"low-to":[113],"demand":[117],"provide":[119],"best":[121],"possible":[122],"service":[123],"granularity.":[124],"Measurements":[125],"our":[127],"prototype":[128],"implementation":[129],"show":[130],"proposed":[133],"approach":[134],"performs":[135],"well":[136],"off-the-shelf":[138],"hardware":[139],"has":[141],"low":[142],"maintenance":[143],"costs.":[144]},"counts_by_year":[{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
