38th Annual IEEE Conference on Local Computer Networks - Workshops 2013
DOI: 10.1109/lcnw.2013.6758546
|View full text |Cite
|
Sign up to set email alerts
|

An investigation into teredo and 6to4 transition mechanisms: Traffic analysis

Abstract: The exhaustion of IPv4 address space increases pressure on network operators and content providers to continue the transition to IPv6. The IPv6 transition mechanisms such as Teredo and 6to4 allow IPv4 hosts to connect to IPv6 hosts. On the other hand, they increase network complexity and render ineffective many methods to observe IP traffic. In this paper, we modified our flow-based measurement system to involve transition mechanisms information to provide full IPv6 visibility. Our traffic analysis focuses on … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 13 publications
(11 reference statements)
0
6
0
Order By: Relevance
“…In recent years, we have seen methods that use not only standard flow records, but also additional features from packet payload to capture the behavior of application protocols such as DNS or HTTP. The prevalent use of web applications and new phenomena such as Bring Your Own Device (BYOD) or Internet of Things (IoT) show the limitation of flow monitoring based on Layer 3 and 4 packet features.…”
Section: History Of Flow‐based Anomaly Detectionmentioning
confidence: 99%
“…In recent years, we have seen methods that use not only standard flow records, but also additional features from packet payload to capture the behavior of application protocols such as DNS or HTTP. The prevalent use of web applications and new phenomena such as Bring Your Own Device (BYOD) or Internet of Things (IoT) show the limitation of flow monitoring based on Layer 3 and 4 packet features.…”
Section: History Of Flow‐based Anomaly Detectionmentioning
confidence: 99%
“…Little research has explored the possibilities of using the application information to improve the measurement itself. In [10] we have shown that the information from IPv6 tunnels can be used to create flows with finer granularity. We expect that the information from application protocols can be utilized in a similar manner to create more detailed flow records.…”
Section: Motivationmentioning
confidence: 99%
“…The ongoing trend in the field of application layer monitoring is towards creation of richer flow records [3], [4], [5], carrying some extra information in addition to the basic flow size and timing statistics. The added information often include values from the application layer protocol headers, such as HTTP, DNS etc.…”
Section: Introductionmentioning
confidence: 99%