On the issues of IP traceback for IPv6 and mobile IPv6

被引:4
|
作者
Lee, HCJ
Ma, M
Thing, VLL
Xu, Y
机构
关键词
D O I
10.1109/ISCC.2003.1214181
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distributed DoS (DDoS) pose significant problems, as they are disruptive to the useful traffics and are hard to prevent. One solution consists in instituting accountability, which hold the attackers accountable for the attack. The key issue is to identify the "real" sources of the attacks as attackers use spoofed IP address to hide their actual network location. However, the Internet architecture does not provide intrinsic support for identifying the real sources of IP packets. Numerous mechanisms have been proposed to "traceback" the real sources. Most of-such works have been addressing the IP version 4. In this paper, we address the issues of IP traceback in the context of IPv6 and Mobile IPv6. This paper provides a detailed analysis of these issues and problems. The main problem lies with the transformations that are introduced by IPv6 and Mobile IPv6 protocols, namely tunneling and addresses manipulation. We then propose a solution, including new ICMPv6 messages for traceback co-ordination, to facilitate the traceback mechanism.
引用
收藏
页码:582 / 587
页数:6
相关论文
共 50 条
  • [1] On IPv6 traceback
    Amin, SO
    Hong, CS
    8TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1-3: TOWARD THE ERA OF UBIQUITOUS NETWORKS AND SOCIETIES, 2006, : U2139 - U2143
  • [2] A lightweight IP traceback mechanism on IPv6
    Amin, Syed Obaid
    Kang, Myung Soo
    Hong, Choong Seon
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 671 - 680
  • [3] A performance comparison of mobile IPv6, hierarchical mobile IPv6, and mobile IPv6 regional registrations
    Osborne, L
    Abdel-Hamid, A
    Ramadugu, R
    2005 International Conference on Wireless Networks, Communications and Mobile Computing, Vols 1 and 2, 2005, : 1545 - 1550
  • [4] An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6
    Jang, Jae-hoon
    Yeo, Don-Gu
    Lee, Dong-hee
    Youm, Heung-Youl
    INFORMATION SECURITY APPLICATIONS, 2011, 6513 : 150 - 159
  • [5] A Secure Packet Marking Scheme for IP Traceback in IPv6
    Tripathy, Animesh
    Dansana, Jayanti
    Mishra, Debi Prasad
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 656 - 659
  • [6] SPIE-IPv6: Single IPv6 packet traceback
    Strayer, WT
    Jones, CE
    Tchakountio, F
    Hain, RR
    LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 118 - 125
  • [7] For a secure mobile IP and mobile IPV6 deployment
    Laurent-Maknavicius, M
    SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 109 - 120
  • [8] A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6
    Lee, Jong-Hyouk
    Han, Youn-Hee
    Gundavelli, Sri
    Chung, Tai Myoung
    TELECOMMUNICATION SYSTEMS, 2009, 41 (04) : 279 - 292
  • [9] Analytical-numerical study of Mobile IPv6 and Hierarchical Mobile IPv6
    Yi, MK
    Hwang, CS
    DISTRIBUTED COMPUTING - IWDC 2004, PROCEEDINGS, 2004, 3326 : 168 - 179
  • [10] Mobility management for all-IP mobile networks: Mobile IPv6 vs. Proxy Mobile IPv6
    Kong, Ki-Sik
    Lee, Wonjun
    Han, Youn-Hee
    Shin, Myung-Ki
    You, HeungRyeol
    IEEE WIRELESS COMMUNICATIONS, 2008, 15 (02) : 36 - 45