A novel IPv6 traceback architecture using COPS protocol

被引:4
作者
Amin, Syed Obaid [1 ]
Siddiqui, Muhammad Shoaib [1 ]
Hong, Choong Seon [1 ]
机构
[1] Kyung Hee Univ, Dept Comp Engn, Sch Elect & Informat, Yongin 449701, Gyeonggi, South Korea
关键词
DDoS; traceback; IPv6; network security; network management;
D O I
10.1007/s12243-008-0018-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In any Distributed Denial of Service (DDoS) attack, invaders may use incorrect or spoofed Internet Protocol (IP) addresses in the attacking packets and thus disguise the actual origin of the attacks. This is primarily due to the stateless nature of the Internet. IP traceback algorithms provide mechanisms for identifying the true source of an IP datagram on the Internet ensuring at least the accountability of cyber attacks. While many IP traceback techniques have been proposed, most of the previous studies focus and offer solutions for DDoS attacks done on Internet Protocol version 4 (IPv4) environment. IPv4 and IPv6 networks differ greatly from each other, which urge the need of traceback techniques specifically tailored for IPv6 networks. In this paper, we propose a novel traceback architecture for IPv6 networks using Common Open-Policy Service and a novel packet-marking scheme. We also provide complete underlying protocol details required for traceback support in IPv6 networks. The proposed architecture is on demand and only single packet is required to traceback the attack.
引用
收藏
页码:207 / 221
页数:15
相关论文
共 21 条
[1]  
[Anonymous], 1998, 2460 RFC IETF
[2]  
[Anonymous], 2004, IPv6 and IPv4 threat comparison and Best-practice evaluation (vl.0)
[3]   Emergence of scaling in random networks [J].
Barabási, AL ;
Albert, R .
SCIENCE, 1999, 286 (5439) :509-512
[4]  
Belenky A, 2003, 2003 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS, AND SIGNAL PROCESSING, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, P49
[5]   On IP traceback [J].
Belenky, A ;
Ansari, N .
IEEE COMMUNICATIONS MAGAZINE, 2003, 41 (07) :142-153
[6]   IP traceback with deterministic packet marking [J].
Belenky, A ;
Ansari, N .
IEEE COMMUNICATIONS LETTERS, 2003, 7 (04) :162-164
[7]  
CARPENTER B, 2001, 3056 RFC IETF
[8]  
CONTA A, 1998, 2473 RFC IETF
[9]  
DURAND A, 2001, 3053 RFC IETF
[10]  
DURHAM D, 2000, 2748 RFC IETF