Hiding TCP Traffic: Threats and Counter-measures

IPv6, Monitoring, Security @Security and Protection of Information 2013, Brno, CZ

Computer networks were designed to be simple and routers do not validate the integrity of the processed traffic. Consequently, an attacker can modify his or her traffic with the aim of confusing any analyser that intercepts the traffic, e.g. monitoring and security software or lawful interception. This paper studies the … Read More

Libor PolčákHiding TCP Traffic: Threats and Counter-measures

Behaviour of various operating systems during SLAAC, DAD, and ND

IPv6, Monitoring, Networking

This post contains the report from the study phase of the behaviour of various operating systems during SLAAC and DAD analysis for our paper called “A New Approach for Detection of Host Identity in IPv6 Networks”, which will be presented at DCNET 2013. This post also contains PCAP files that … Read More

Libor PolčákBehaviour of various operating systems during SLAAC, DAD, and ND