Search For:

Displaying 1-7 out of 7 total
The Blind Man's Bluff Approach to Security Using IPv6
Found in: IEEE Security & Privacy Magazine
By Matthew Dunlop,Stephen Groat,William Urbanski,Randy Marchany,Joseph Tront
Issue Date:July 2012
pp. 35-43
Most networks today employ static network defenses. The problem with static defenses is that adversaries have unlimited time to circumvent them. This article proposes a moving-target defense based on the Internet Protocol version 6 (IPv6) that dynamically ...
 
Using an IPv6 moving target defense to protect the Smart Grid
Found in: Innovative Smart Grid Technologies, IEEE PES
By Stephen Groat,Matthew Dunlop,William Urbanksi,Randy Marchany,Joseph Tront
Issue Date:January 2012
pp. 1-7
As advanced Internet Protocol (IP)-based communication systems are proposed for the Smart Grid, security solutions must be developed which address not only the security of the communications, but also the security of the communicating systems. To support t...
 
The Good, the Bad, the IPv6
Found in: Communication Networks and Services Research, Annual Conference on
By Matthew Dunlop, Stephen Groat, Randy Marchany, Joseph Tront
Issue Date:May 2011
pp. 77-84
As more network-capable devices are developed, it becomes easier for us to remain connected to our friends, colleagues, and even our homes. Unfortunately, it becomes easier for unintended third parties to remain connected to us as well. The impact of this ...
 
GoldPhish: Using Images for Content-Based Phishing Analysis
Found in: Internet Monitoring and Protection, International Conference on
By Matthew Dunlop, Stephen Groat, David Shelly
Issue Date:May 2010
pp. 123-128
Phishing attacks continue to plague users as attackers develop new ways to fool users into submitting personal information to fraudulent sites. Many schemes claim to protect against phishing sites. Unfortunately, most do not protect against zero-day phishi...
 
IPv6: Nowhere to Run, Nowhere to Hide
Found in: Hawaii International Conference on System Sciences
By Stephen Groat, Matthew Dunlop, Randy Marchany, Joseph Tront
Issue Date:January 2011
pp. 1-10
Due to a large address space, Internet Protocol version 6 (IPv6) uses stateless address autoconfiguration to assign network addresses to hosts. This unmanaged technique creates a static value derived from the Media Access Control (MAC) address of a network...
   
Using geographic information systems for enhanced network security visualization
Found in: Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research & Application (COM.Geo '10)
By David Shelly, Matthew Dunlop, Peter Sforza, Randy Marchany
Issue Date:June 2010
pp. 1-8
The sheer volume of information that floods a network makes it difficult for network analysts to identify and isolate network security threats. This difficulty is compounded by the fact that the tools available to accomplish this task lack usability and ar...
     
The privacy implications of stateless IPv6 addressing
Found in: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '10)
By Joseph Tront, Matthew Dunlop, Randy Marchany, Stephen Groat
Issue Date:April 2010
pp. 1-4
Current implementations of the Internet Protocol version 6 (IPv6) use a static value determined from the Media Access Control (MAC) address as the host portion, or interface identifier (IID), of the IPv6 address. Some implementations create the IID using t...
     
 1