Merit Network

Displaying 1-3 of 3 results

  • White Papers // Jan 2011

    Doing More With Less: End-to-End Consistent IPv4 Address Sharing

    The Internet is rapidly nearing IPv4 address space exhaustion. Current projections predict that within the next two years, all IPv4 address blocks will have been assigned. IPv6 adoption on the other hand has been slower than anticipated. It is becoming increasingly clear that there will be an extended period of...

    Provided By Merit Network

  • White Papers // Jan 2011

    Honeyd Detection Via Packet Fragmentation

    This paper describes a serious flaw in a popular honeypot software suite that allows an attacker to easily identify the presence and scope of a deployed honeypot. The authors describe in detail both the flaw and how it can be used by an attacker. The technique relies on a set...

    Provided By Merit Network

  • White Papers // Jul 2009

    Characterizing Dark DNS Behavior

    Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on dark-nets, or unused address space, for attack detection. While the attack traffic gleaned from such deployments has been thoroughly scrutinized, little attention has been paid to DNS queries targeting these addresses. In this paper,...

    Provided By Merit Network

  • White Papers // Jul 2009

    Characterizing Dark DNS Behavior

    Security researchers and network operators increasingly rely on information gathered from honeypots and sensors deployed on dark-nets, or unused address space, for attack detection. While the attack traffic gleaned from such deployments has been thoroughly scrutinized, little attention has been paid to DNS queries targeting these addresses. In this paper,...

    Provided By Merit Network

  • White Papers // Jan 2011

    Doing More With Less: End-to-End Consistent IPv4 Address Sharing

    The Internet is rapidly nearing IPv4 address space exhaustion. Current projections predict that within the next two years, all IPv4 address blocks will have been assigned. IPv6 adoption on the other hand has been slower than anticipated. It is becoming increasingly clear that there will be an extended period of...

    Provided By Merit Network

  • White Papers // Jan 2011

    Honeyd Detection Via Packet Fragmentation

    This paper describes a serious flaw in a popular honeypot software suite that allows an attacker to easily identify the presence and scope of a deployed honeypot. The authors describe in detail both the flaw and how it can be used by an attacker. The technique relies on a set...

    Provided By Merit Network