(Server IPv6 Addresses)

First, we estimate the Entropy for each nybble in the IPv6 addresses, across the whole dataset. For example, if the last nybble is highly variable, then the corresponding Entropy will be high. Conversely, the Entropy will be zero for nybbles that stay constant across the dataset. Below we plot the normalized value of Entropy for each of the 32 nybbles, along with the 4-bit Aggregate Count Ratio, which was introduced in Plonka and Berger, 2015.

Second, we group adjacent nybbles with similar Entropy to form larger **segments**, with
the expectation that they represent semantically different parts of each address.
We label these segments with letters and mark them with dashed lines in the plot below.

Next, we search the segments for the most popular values and ranges of values within them. For that purpose, we use statistical methods for detecting outliers and the DBSCAN machine learning algorithm. We analyze distribution and frequencies of values inside address segments.

Below we present the results, with ranges of values shown as two values in italics (bottom to top). The last column gives the relative frequency across the whole dataset. The /32 prefixes are anonymized.

A: bits 0-32 (hex chars 1- 8)

- 20010db8 49.46%
- 30010db8 30.98%
- 40010db8 13.07%
- 50010db8 4.04%
- 60010db8 1.26%
- 70010db8 0.87%
- 80010db8 0.29%
B: bits 32-40 (hex chars 9-10)

- 40 98.71%
- a0 0.90%
- 48 0.23%
* 00-f0 0.17%C: bits 40-44 (hex chars 11-11)

- 0 82.55%
- 1 17.43%
D: bits 44-48 (hex chars 12-12)

- 1 16.54%
- 3 11.82%
- c 11.52%
- 2 7.14%
- 7 6.57%
- 0 6.12%
* 4-f 40.29%E: bits 48-52 (hex chars 13-13)

- 0 99.98%
F: bits 52-60 (hex chars 14-15)

- c0 36.97%
- 00 19.20%
- 80 17.77%
- 01 8.69%
- c1 5.88%
- 02 5.50%
* 03-c2 5.98%G: bits 60-64 (hex chars 16-16)

- 1 10.43%
- 2 9.09%
- 3 8.53%
- 0 8.15%
- 4 7.91%
* 5-f 55.89%H: bits 64-112 (hex chars 17-28)

- 000000000000 99.99%
I: bits 112-116 (hex chars 29-29)

- 0 66.75%
- 2 18.02%
- 1 15.22%
J: bits 116-120 (hex chars 30-30)

- 0 95.27%
- 2 3.92%
- 4 0.77%
K: bits 120-124 (hex chars 31-31)

- 0 37.10%
- 1 36.63%
- 6 3.92%
- 7 3.71%
- 5 3.45%
* 2-e 15.19%L: bits 124-128 (hex chars 32-32)

- 9 7.35%
- 6 7.30%
- 8 7.14%
- 7 7.02%
* 0-f 71.19%

Next, we search for statistical dependencies between the segments. For that purpose, we train a Bayesian Network (BN) from data.

Below we show structure of the corresponding BN model. Arrows indicate direct statistical influence. Note that directly connected segments can probabilistically influence each other in both directions (upstream / downstream). Under some conditions, segments without direct connection can still influence each other through other segments: e.g., A can influence C through B if C depends on B and B depends on A (even if there is no direct arrow between A and C).

Learning BN structure from data is in general a challenging optimization problem. Hence, there might be more than one possible BN structure graph for the same dataset.

Finally, below we show an interactive browser that decomposes IPv6 addresses into segments, values, ranges, and their corresponding probabilities. The browser lets for exploring the underlying BN model and see how certain segment values probabilistically influence the other segments.

Try clicking on the colored boxes below. You should see the colors changing, which reflects
the fact that some segment values can make the other values more (or less) likely. For instance,
in the Sample Report, you may find that clicking on
**J1** (i.e., the first value in segment **J**) makes segments **C, D, F, H,** and
**I** largely predictable (see our paper for more examples).

You may condition the model on many segment values. Clicking on selected values un-selects them. Clicking on the red "Clear" above the color map un-selects them all. Below the browser we show the estimated proportion of the addresses matching your selection (vs. the dataset). If the browser cannot estimate the probabilities in a reasonable time, it asks before trying harder.

Loading...

Using the BN model, below we generate a few candidate target IPv6 addresses matching the selection above. Note that we anonymize the IPv6 addresses in this report.

As we show in the paper, this technique allowed us to successfully scan IPv6 networks of servers and routers, and to predict the IPv6 network identifiers of active client IPv6 addresses.