CS Store Search
Displaying 1-7 out of 7 total
The Blind Man's Bluff Approach to Security Using IPv6
IEEE Security & Privacy Magazine
By Matthew Dunlop,Stephen Groat,William Urbanski,Randy Marchany,Joseph Tront
Issue Date:July 2012
Most networks today employ static network defenses. The problem with static defenses is that adversaries have unlimited time to circumvent them. This article proposes a moving-target defense based on the Internet Protocol version 6 (IPv6) that dynamically ...
Using an IPv6 moving target defense to protect the Smart Grid
Innovative Smart Grid Technologies, IEEE PES
By Stephen Groat,Matthew Dunlop,William Urbanksi,Randy Marchany,Joseph Tront
Issue Date:January 2012
As advanced Internet Protocol (IP)-based communication systems are proposed for the Smart Grid, security solutions must be developed which address not only the security of the communications, but also the security of the communicating systems. To support t...
The Good, the Bad, the IPv6
Communication Networks and Services Research, Annual Conference on
By Matthew Dunlop, Stephen Groat, Randy Marchany, Joseph Tront
Issue Date:May 2011
As more network-capable devices are developed, it becomes easier for us to remain connected to our friends, colleagues, and even our homes. Unfortunately, it becomes easier for unintended third parties to remain connected to us as well. The impact of this ...
GoldPhish: Using Images for Content-Based Phishing Analysis
Internet Monitoring and Protection, International Conference on
By Matthew Dunlop, Stephen Groat, David Shelly
Issue Date:May 2010
Phishing attacks continue to plague users as attackers develop new ways to fool users into submitting personal information to fraudulent sites. Many schemes claim to protect against phishing sites. Unfortunately, most do not protect against zero-day phishi...
IPv6: Nowhere to Run, Nowhere to Hide
Hawaii International Conference on System Sciences
By Stephen Groat, Matthew Dunlop, Randy Marchany, Joseph Tront
Issue Date:January 2011
Due to a large address space, Internet Protocol version 6 (IPv6) uses stateless address autoconfiguration to assign network addresses to hosts. This unmanaged technique creates a static value derived from the Media Access Control (MAC) address of a network...
Using geographic information systems for enhanced network security visualization
Found in: Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research & Application (COM.Geo '10)
By David Shelly, Matthew Dunlop, Peter Sforza, Randy Marchany
Issue Date:June 2010
The sheer volume of information that floods a network makes it difficult for network analysts to identify and isolate network security threats. This difficulty is compounded by the fact that the tools available to accomplish this task lack usability and ar...
The privacy implications of stateless IPv6 addressing
Found in: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '10)
By Joseph Tront, Matthew Dunlop, Randy Marchany, Stephen Groat
Issue Date:April 2010
Current implementations of the Internet Protocol version 6 (IPv6) use a static value determined from the Media Access Control (MAC) address as the host portion, or interface identifier (IID), of the IPv6 address. Some implementations create the IID using t...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.