Lightweight IP Traceback Mechanism on IPv6 Network Environment

Vol. 17, No. 2, pp. 93-102, Apr. 2007
10.13089/JKIISC.2007.17.2.93, Full Text:
Keywords: Traceback, IPv6, Probabilistic Packet Marking
Abstract

A serious problem to fight DDoS attacks is that attackers use incorrect or spoofed IP addresses in the attack packets. Due to the stateless nature of the internet, it is a difficult problem to determine the source of these spoofed IP packets. The most of previous studies to prevent and correspond to DDoS attacks using the traceback mechanism have been accomplished in IPv4 environment. Even though a few studies in IPv6 environment were introduced, those have no detailed mechanism to cope with DDoS attacks. The mechanisms for tracing the origin of attacks in IPv6 networks have so many differences from those of IPv4 networks. In this paper we proposed a lightweight IP traceback mechanism in IPv6 network environment. When marking for traceback is needed, the router can generate Hop-by-Hop option and transmit the marked packet. We measured the performance of this mechanism and at the same time meeting the efficient marking for traceback.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
J. Heo, M. Kang, C. Hong, "Lightweight IP Traceback Mechanism on IPv6 Network Environment," Journal of The Korea Institute of Information Security and Cryptology, vol. 17, no. 2, pp. 93-102, 2007. DOI: 10.13089/JKIISC.2007.17.2.93.

[ACM Style]
Joon Heo, Myung-Soo Kang, and Choong-Seon Hong. 2007. Lightweight IP Traceback Mechanism on IPv6 Network Environment. Journal of The Korea Institute of Information Security and Cryptology, 17, 2, (2007), 93-102. DOI: 10.13089/JKIISC.2007.17.2.93.