A Web-Based Honeypot in IPv6 to Enhance Security

IPv6 is a next-generation IP protocol that replaces IPv4. It not only expands the number of network address resources but also solves the problem of multiple access devices connected to the Internet. While IPv6 has brought excellent convenience to the public, related security issues have gradually emerged, and an assessment of the security situation in IPv6 has also become more important. Unlike passive defense, the honeypot is a security device for active defense. The real network application and the fake network application, disguised by the honeypot, are located on a similar subnet, and provide a network application service; but, in both cases, behavior logs from unauthorized users are caught. In this manner, and to protect web-based applications from attacks, this article introduces the design and implementation of a web-based honeypot that includes a weak password module and an SQL inject module, which supports the IPv6 network to capture unauthorized access behavior. We also propose the Security Situation Index (SSI), which can measure the security situation of the network application environment. The value of SSI is established according to the different parameters that are based on honeypots. There is a firewall outside the test system environment, so the obtained data should be used as the real invasion data, and the captured behavior is not a false positive. Threats can be spotted smartly by deploying honeypots; this paper demonstrates that the honeypot is an excellent method of capturing malicious requests and can be measured with the SSI of the whole system. According to the information, the administrator can modify the current security policy, which can improve the security level of a whole IPv6 network system.

to solve the problem of automatic control. This is the first discussion to use Cognitive Awareness Control to address Network Security Situation Awareness (NSSA) regulatory issues. Zhao and Liu discuss the network security situational awareness in the big data environment, and established the network security situational awareness index system. The index factors are selected and quantified, and then the network security situational awareness system is constructed by calculating the situation value [12]. Zhang and Shi et al. introduce the concept and challenges of NSSA and discusses ways to solve them [13]. They provided an assessment of the state of cyber security and how to apply it to NSSA. At last, they proposed a multi-level analysis framework of NSSA. Liang, Y. and Wang, H.Q. et al. combine evolutionary strategies and neural networks to propose a quantitative method for network security situational awareness [14]. The evolutionary strategy was used to optimize the parameters of the neural network, and then the evolutionary neural network model was established to extract the network security status factors and quantify the network security status. Wang and Liang et al. propose a research method of network situational awareness based on stochastic game theory [15]. In their work, a network situation-aware quantification method based on network service state analysis was proposed and a network attack and defense game model including both attackers and defenders was also constructed.

Honeypot and IPv6
Honeypot technology is one of the ways to help to spot threats in the IPv6 network space. Typically used in the online server as a bait for the primary server to mitigate the attack to the bait instead of the primary server. Recently, honeypot research has also expanded to many fields, including camouflage deception, data capture, data control, and data analysis. There are several kinds of honeypot methods, some include blockchain enabled architecture, SDN-enabled architecture, social network-based architecture, service port-based architecture gameplay model based, etc. The details of research as follows: Shi, L. and Li, Y. et al. [16] think that applying the dynamics of honeypots to system services shows that real or fake services (honeypots) can be changed in different hosts. In addition, they use a blockchain platform to decentralize the system and store port access data by providing a private chain. Fan, W. and Du, Z. et al. [17] propose a novel honeypot architecture called HoneyDOC to support a full range of honeypot design and implementation. The HoneyDOC architecture clearly identifies three basic independent and collaborative modules: baits, traps, and coordinators. Based on an efficient architecture, a software-defined networked honeypot system is designed that provides a high degree of programmability and technically maintains the ability to capture high quality data. Paradise, A. and Shabtai, A. et al. [18] propose a framework for managing social network honeypots, and analyzes the deployment process of social network honeypots and their maintenance in actual social networks. The honeypot profile has been successfully absorbed into the organization's social network and received suspicious friend requests and emails showing the basic signs of a potential attack. La, Q.D and Quek, T.Q. et al. [19] addresses the issue of defending against attacks in honeypot-enabled networks by studying gameplay models that include the spoofing of attackers and defenders. Attackers may try to deceive defenders by suspicious activity to seemingly normal activities, and defenders can in turn use honeypots as a deception to trap the attacker. The problem is modeled as a Bayesian game with incomplete information, where both the one-game and the repeated game versions are determined to be equalized. The results show that there is a threshold for the frequency of active attackers, at which both players will take deceptive action. Below this threshold, defenders can mix their strategies while keeping the attacker's success rate low.
To deal with the security problem on an IP address level, Kishimoto, K.; Ohira, K.; Yamaguchi, Y, et al. [20] did some honeypot work in IP protocol layer. Scheffler T, Schindler S, Schnor B, et al. provide a honeypot named HoneydV6. Besides IPv6 packet processing, HoneydV6 implements necessary parts of the ICMPv6 and the Neighbor Discovery Protocol (NDP) [21,22]. Prof. Dr. Bettina Schnor proposes two different honeypot architectures and presents the corresponding prototype implementations, called Honeydv6 and Hyhoneydv6, to overcome the need for IPv6 honeypot. To catch the behavior of Information 2020, 11, 440 4 of 12 attack on IPv6 Extension Headers/Fragmentation Mechanism/Flow Label, some honeypot support IPv6 network in http mode, but there is no weak password and SQL injection module [23]. Zuzcak M, Sochor T. [24] propose an FTP honeypot which based on port 22 in SSH mode. Zobal L, Kolar D, Fujdiak R. [25] survey honeypot problematics and deception-based defensive strategies in the cyberworld.

Access Control and Security Issues in IPv6
Access control is a traditional basic issue in security field. Masood, A.; Ghafoor, A. et al. [26] propose an approach for conformance testing of implementations required to enforce access control policies specified using the Temporal Role-Based Access Control (TRBAC) model. Uddin, M.; Islam, S. et al. [27] defined an Authorising Workflow Task Role Based Access Control using the existing task and workflow concepts. It integrates the dynamic Segregation of Duties (SoD) considering the task instance restriction to ensure overall access governance and accountability. It enhances the existing access control models such as Role Based Access Control (RBAC) by dynamically granting users access right and providing Access governance. Liu, Q.; Zhang, H. et al. [28] present an access control model for resource sharing based on the role-based access control intended for multi-domain Manufacturing Internet of Things (MIoT). In multi-domain systems, to respond to the assigning request for permission for the certain role from the certain user, an authority action sequence named the authorization route is employed to determine an appropriate authorization state. Traditional trust models are based on reputation which is only a numerical value. Therefore, it is not fit for fine-grained access control which is needed in many online applications. Towards this problem, Xu, C.; Wang, Y. et al. [29] proposed a novel trust model based on temporal historical data for access control. In addition, there are community-based security access models [30], trust-based fuzzy access control methods [31], etc., which provide an attempted approach to IPv6 security system access control. There are some Network-based IPv6 attack types, as follows: Address Spoofing, Duplicate Address Detection Attack, Prefix spoofing attack [32]. Redirection Attack, Attacks on Cryptographically Generated Address (CGA), Attacks against IPv6 Service Applications, Security risks under IPv6 and IPv4 dual stack.
To the best of our knowledge, there are many IPv4 based honeypot, but still, few honeypots support the IPv6 mode. In comparison with other honeypots, we focus on the web application types of honeypot that gives a virtual machine configurable. The novel web-based honeypot in IPv6 described in this paper enables us to deployed easily in different network areas includes core areas, Demilitarized Zone (DMZ) areas, client access areas, etc., which can test the granularity defense capability of access control in access control field. Our environment is capable of investigating the attack techniques include weak password and SQL injection attacks. The case of brute force cracking in SSH or RDP protocol will not be considered according to the character of this kind honeypot.

Design of a Honeypot-Based IPv6 System
There are different kinds of attacks in each layer, even each protocol. For different types of protocol, there should be a different kind of honeypot. Therefore, we propose a web-based HTTP service honeypot in port 80, which includes the weak password module and the SQL injection module. And then, we present a group of honeypots to get the index of network security situation and detect the whole security level of the network.
We developed a honeypot-based IPv6 security situation awareness system that is a trap to catch attackers. Since honeypots do not provide truly valuable services to the outside world, all attempts at honeypots are very suspicious; another use of honeypots is to delay the attack action of the attacker on the true target and disperse the attacker's attention driving the attacker to waste time on the honeypot and make them to abandon the unsuccessful attack. This platform can monitor the IPv6 system security situation in real time, capture the behavior of illegal users, and use the honeypot system to transfer attacks from the main system to the trap system. Through analysis of behavior logs Process and analyze the behavior of the attacker.
Information 2020, 11, 440 5 of 12 The honeypot system is created using a docker container based virtual machine with the following specifications: 2 CPU/4GB/1Gb Ethernet IPv6. The honeypot can be configured using a different based on CPU/memory/network arguments. The honeypot should deploy in the same network as the web server with the firewall and connect to the internet.
The goal of the honeypot is to store every request from the attacker to the web application; so, in this honeypot, several low-interaction web applications are installed: Weak password module and SQL injection websites module. The attacker makes a malicious request, this honeypot will process the request, and meantime get the log of malicious behavior, and replies to the administrator. Therefore, we use the docker container to provide several web applications as the main body of the honeypot which include: Section 3.1 Basic log system, Section 3.2 Weak password Website and Section 3.3 SQL injection Website. To measure the security level of the test network, we describe the Index of Security Situation Awareness in Section 3.4.

Fake Website Logs
Logs are the most primitive information records of system operation, and they are the most basic means for detecting network security. The server generates a large number of logs every day: system logs, access logs, database logs, etc. The logs record a large amount of information about system operation, including program execution, data operations, operating errors, system crashes, and IP information and operation information accessed by users and many more. Analyzing the logs can mine the system operation status to ensure the normal operation of the system can quickly locate operating errors and handle optimizations, analyze server traffic and user behavior characteristics to help provide better services, quickly find security issues and make a timely response.
The purpose of the virtual website is to generate a login log. This article creates a virtual website. The website implements a simple login function page and content display page. It generates logs by simulating login and records related log information such as time, username, password, and IP, and supports IPv6 access. Enter the username and password through the login page, the system is matched, and if it is correct, the display page is entered. In this system we used the ELK. We designed a log management system using a technology solution combining Docker container and ELK (Elasticsearch + Logstash + Kibana) [33]. The business process design is shown in Figure 1.
Information 2020, 11, x FOR PEER REVIEW 5 of 13 The honeypot system is created using a docker container based virtual machine with the following specifications: 2 CPU/4GB/1Gb Ethernet IPv6. The honeypot can be configured using a different based on CPU/memory/network arguments. The honeypot should deploy in the same network as the web server with the firewall and connect to the internet.
The goal of the honeypot is to store every request from the attacker to the web application; so, in this honeypot, several low-interaction web applications are installed: Weak password module and SQL injection websites module. The attacker makes a malicious request, this honeypot will process the request, and meantime get the log of malicious behavior, and replies to the administrator. Therefore, we use the docker container to provide several web applications as the main body of the honeypot which include: Section 3.1 Basic log system, Section 3.2 Weak password Website and Section 3.3 SQL injection Website. To measure the security level of the test network, we describe the Index of Security Situation Awareness in Section 3.4.

Fake Website Logs
Logs are the most primitive information records of system operation, and they are the most basic means for detecting network security. The server generates a large number of logs every day: system logs, access logs, database logs, etc. The logs record a large amount of information about system operation, including program execution, data operations, operating errors, system crashes, and IP information and operation information accessed by users and many more. Analyzing the logs can mine the system operation status to ensure the normal operation of the system can quickly locate operating errors and handle optimizations, analyze server traffic and user behavior characteristics to help provide better services, quickly find security issues and make a timely response.
The purpose of the virtual website is to generate a login log. This article creates a virtual website. The website implements a simple login function page and content display page. It generates logs by simulating login and records related log information such as time, username, password, and IP, and supports IPv6 access. Enter the username and password through the login page, the system is matched, and if it is correct, the display page is entered. In this system we used the ELK. We designed a log management system using a technology solution combining Docker container and ELK (Elasticsearch + Logstash + Kibana) [33]. The business process design is shown in Figure 1.

Weak Password Website Module in the Honeypot
In the Internet environment, simple password is the biggest risk faced by the server. Although everyone knows that setting a longer, more complex password will be more secure, there are always some users who use simple, easy-to-remember password strings for convenience. Weak passwords are not strictly and accurately defined. Generally, passwords that are easily guessed by others (they may know you well) or cracked by cracking tools are weak passwords. A weak password is a password that contains only simple numbers and letters, such as "123", "abc", etc. In the experiment, when an intruder tries to invade the honeypot network, each user needs to enter the login

Weak Password Website Module in the Honeypot
In the Internet environment, simple password is the biggest risk faced by the server. Although everyone knows that setting a longer, more complex password will be more secure, there are always some users who use simple, easy-to-remember password strings for convenience. Weak passwords are not strictly and accurately defined. Generally, passwords that are easily guessed by others (they may know you well) or cracked by cracking tools are weak passwords. A weak password is a password that contains only simple numbers and letters, such as "123", "abc", etc. In the experiment, when an intruder tries to invade the honeypot network, each user needs to enter the login information, including the username and password, which will be displayed in the log and track the intruder's IP address.

SQL Injection Website Module in the Honeypot
SQL injection attacks are one of the common methods used by hackers to attack databases. The user can submit a piece of database query code and get some data he wants to know based on the results returned by the program. This is SQL injection. SQL injection is accessed from a normal port, and it looks no different from ordinary web page access. Therefore, firewalls on the market will not warn about SQL injection. If the administrator does not have the habit of viewing logs, they may not be aware of the intrusion for a long time.
The system consists of virtual websites and set up a group which based on "Docker plus ELK" [33] architecture to form a honeypot to fool attackers and record log information. Docker can easily create a lightweight, portable container for any application. The role of the virtual website is to induce logins and record information. The main function of ELK is log management and analysis. ELK is deployed in Docker containers. The system architecture design is shown in Figure 2.
Information 2020, 11, x FOR PEER REVIEW 6 of 13 information, including the username and password, which will be displayed in the log and track the intruder's IP address.

SQL Injection Website Module in the Honeypot
SQL injection attacks are one of the common methods used by hackers to attack databases. The user can submit a piece of database query code and get some data he wants to know based on the results returned by the program. This is SQL injection. SQL injection is accessed from a normal port, and it looks no different from ordinary web page access. Therefore, firewalls on the market will not warn about SQL injection. If the administrator does not have the habit of viewing logs, they may not be aware of the intrusion for a long time.
The system consists of virtual websites and set up a group which based on "Docker plus ELK" [33] architecture to form a honeypot to fool attackers and record log information. Docker can easily create a lightweight, portable container for any application. The role of the virtual website is to induce logins and record information. The main function of ELK is log management and analysis. ELK is deployed in Docker containers. The system architecture design is shown in Figure 2.

Index of Security Situation Awareness (SSI)
As we all know, in view of websites, the computer network environment can be divided into several levels of security. There are core security areas, medium-security areas, and general security areas. We deploy different numbers of honeypots in different levels of the application service network area. Each honeypot has two fake services to test security. According to the data from the network environment, we can compute the SSI. Definitions can be defined as follows:

Definition 2. Suppose that the honeypots ( ) located in high-security area include weak password style ( ) and SQL injection style ( ). is the number of honeypots.
If the honeypot catches the attack attempt of weak password behavior, the value of is 1. Else the value is 0.
If the honeypot catches the attack attempt of SQL injection behavior, the value of is 1. Else the value is 0.

Definition 3. Suppose that the honeypots ( ) located in middle-security area include weak password style (
) and SQL injection style ( ). is the number of honeypots.

Index of Security Situation Awareness (SSI)
As we all know, in view of websites, the computer network environment can be divided into several levels of security. There are core security areas, medium-security areas, and general security areas. We deploy different numbers of honeypots in different levels of the application service network area. Each honeypot has two fake services to test security. According to the data from the network environment, we can compute the SSI. Definitions can be defined as follows: Definition 1. Suppose there are three kinds of areas sets: high-security area (H), middle-security area (M) and low-security area (L).

Definition 2.
Suppose that the honeypots (HH i ) located in high-security area include weak password style (HH i W) and SQL injection style (HH i I). i is the number of honeypots.
If the honeypot catches the attack attempt of weak password behavior, the value of HH i W is 1. Else the value is 0.
If the honeypot catches the attack attempt of SQL injection behavior, the value of HH i I is 1. Else the value is 0. Definition 3. Suppose that the honeypots (MH j ) located in middle-security area include weak password style MH j W and SQL injection style (MH j I). j is the number of honeypots.
If the honeypot catches the attack attempt of weak password behavior, the value of MH j W is 1. Else the value is 0. If the honeypot catches the attack attempt of SQL injection behavior, the value of MH j I is 1. Else the value is 0.

Definition 4.
Suppose that the honeypots (LH k ) located in low-security area includes weak password style (LH k W) and SQL injection style (LH k I). k is the number of honeypots.
If the honeypot catches the attack attempt of weak password behavior, the value of LH k W is 1. Else the value is 0.
If the honeypot catches the attack attempt of SQL injection behavior, the value of LH k I is 1. Else the value is 0. Definition 5. SSI is supposed as the situation security index.
i ∈ (0, m); j ∈ (0, n); k ∈ (0, p) which present the number of honeypots in High-security area (m), Middle-security area (n) and Low-security area (p). The value of x, y, z depend on the Weighting Factor in the location of level of security. Different area has different weight factor. Weight is a parameter, shown in Table 1; it depends on the importance of the detection service application environment deprived from the Model for Measuring Value of an Asset Based on Confidentiality Integrity Availability (CIA) [34].  Figure 3 displays the base unit of SSI.
Information 2020, 11, x FOR PEER REVIEW 8 of 13

Experiment and Discussions
We need to test the proposed honeypot methods, so we developed two web applications: a weak password application port with 2022, http://[2408:400a:111:5600:a09d:3ab:d70d:648d]:2022 and shown in Figure 4; a SQL injection application port with 2023, http://[2408:400a:111:5600:a09d:3ab:d70d:648d]:2023 shown in Figure 5. As there is a firewall in front of the honeypot, a normal user cannot access these websites unless you attend the firewall in an inner network environment. The basic process is to arrange these two security traps, spoofs security vulnerabilities, deploys security traps to invade attackers, then collect attack information, because the honeypot system does not provide services to the outside, and there are no resources available, so any attempt to connect to the honeypot is suspicious. SSI is also computed in this section with different cases to measure the level of security.

Experiment and Discussions
We need to test the proposed honeypot methods, so we developed two web applications: a weak password application port with 2022, http://[2408:400a:111:5600:a09d:3ab:d70d:648d]:2022 and shown in Figure  4; a SQL injection application port with 2023, http://[2408:400a:111:5600:a09d:3ab:d70d:648d]:2023 shown in Figure 5. As there is a firewall in front of the honeypot, a normal user cannot access these websites unless you attend the firewall in an inner network environment. The basic process is to arrange these two security traps, spoofs security vulnerabilities, deploys security traps to invade attackers, then collect attack information, because the honeypot system does not provide services to the outside, and there are no resources available, so any attempt to connect to the honeypot is suspicious. SSI is also computed in this section with different cases to measure the level of security.

Honeypot Situation Awareness Parts
The log collection function is to synchronize the logs generated by the virtual website to Logstash in real time, Log analysis is completed by the Logstash filter plugin. This system mainly analyzes and get the statistics the IP in the login information, using regular expression plugin (GROK) which supports IPv6 matching and resolution.
Converting the analyzed data into more intuitive charts to show the analysis results can make it easier for us to understand various analysis results and capture abnormal situations. We configure

Honeypot Situation Awareness Parts
The log collection function is to synchronize the logs generated by the virtual website to Logstash in real time, Log analysis is completed by the Logstash filter plugin. This system mainly analyzes and get the statistics the IP in the login information, using regular expression plugin (GROK) which supports IPv6 matching and resolution.
Converting the analyzed data into more intuitive charts to show the analysis results can make it easier for us to understand various analysis results and capture abnormal situations. We configure the visual display website to display the behavior or attackers. The interface with data is shown in Figure 6.

Honeypot Situation Awareness Parts
The log collection function is to synchronize the logs generated by the virtual website to Logstash in real time, Log analysis is completed by the Logstash filter plugin. This system mainly analyzes and get the statistics the IP in the login information, using regular expression plugin (GROK) which supports IPv6 matching and resolution.
Converting the analyzed data into more intuitive charts to show the analysis results can make it easier for us to understand various analysis results and capture abnormal situations. We configure the visual display website to display the behavior or attackers. The interface with data is shown in Figure 6.  In the honeypot environment, defenders can systematically collect, analyze, and organize all digital evidence without the intruder's sense. Analyzing the log files based on the honeypot can help the defender determine the source and intent of the attack, and processing and combing the collected attack information can guide the configuration of defense device policies. The defender can cooperate with the honeypot system to implement linkage work, set strict access control policies on the network boundary area, core routers, and firewalls to form an active defense ecological chain and improve the level of network security defense. To evaluate the effectiveness of this method, we deployed the honeypot in the IPv6 based network environment. At the end, a fault visit is caught. The next step is that we need to locate the invade IP address, find the attacker, and improve the level of base line security policies.

The Index of Security Situation Awareness
We set some different cases to evaluate the value of Index of Security Situation in defined application environment. In the network application environment, three level of security protection are set in the experiment, different numbers of honeypot are set in Table 2 and Weighting Factor are set in Table 3. The argument 'a' is the number of honeypots in high-security area (H), 'b' is the number of honeypots in the middle-security area (M) and 'c' is the number of honeypots in the low-security area (L). The arguments 'x','y','z' are parameters which should be set in advance. According to the Definition 1-5, we can compute the value of SSI, which shown in Figure 7. This result can help the administrator of defender understand the security situation of the protected network application. The smaller the amount of SSI, the safer the network application.   According to the Definition 1-5, we can compute the value of SSI, which shown in Figure 7. This result can help the administrator of defender understand the security situation of the protected network application. The smaller the amount of SSI, the safer the network application. According to the design of the above experiments, we have verified the honeypot-based web application in IPv6 and the SSI in the whole information system: (1) The model presented in this paper can run in an IPv6 network environment; (2) The security situation of the whole network can measure by deploying a group of honeypots in different security areas of the system.

Conclusions
A perfect honeypot deception can even make an attacker feel that they have not easily achieved the desired goal and convinced them that the intrusion was successful. From the perspective of network security protection, honeypot security technology, as an active security defense method, can effectively combat network attacks. This technology can play an important role in detection, protection, and response. It can find attacks, delay attacks, and play the role of defense against attacks.
In this paper, we proposed a web-based honeypot in IPv6 network environment with the main advantage of measuring the security situation awareness with SSI. In actual testing, the honeypot is According to the design of the above experiments, we have verified the honeypot-based web application in IPv6 and the SSI in the whole information system: (1) The model presented in this paper can run in an IPv6 network environment; (2) The security situation of the whole network can measure by deploying a group of honeypots in different security areas of the system.

Conclusions
A perfect honeypot deception can even make an attacker feel that they have not easily achieved the desired goal and convinced them that the intrusion was successful. From the perspective of network security protection, honeypot security technology, as an active security defense method, can effectively combat network attacks. This technology can play an important role in detection, protection, and response. It can find attacks, delay attacks, and play the role of defense against attacks.
In this paper, we proposed a web-based honeypot in IPv6 network environment with the main advantage of measuring the security situation awareness with SSI. In actual testing, the honeypot is quickly deployed using Docker technology. This method is easy to deploy, highly effective, and can effectively capture malicious attacks and record the attacker's information. Security administrators can update the policies to improve the ability of protecting the whole application system. The attacking IP captured by the honeypot can be rejected as a blacklist in firewall policies that essentially eliminates the possibility of an attack. In the meantime, these kinds of honeypot systems can measure the level of whole system security. In the future, we will create a low-interaction honeypot in more network modes.
Author Contributions: K.W. and D.Y. conceived and designed research; All authors wrote the initial paper; Y.L. and D.Y. conducted research; D.Y. and Y.L. revised the paper; All authors have read and agreed to the published version of the manuscript.