An authentication based source address spoofing prevention method deployed in IPv6 edge network

被引:0
|
作者
Xie, Lizhong [1 ]
Bi, Jun [1 ]
Wu, Jianpin [1 ]
机构
[1] Tsinghua Univ, Network Res Ctr, Beijing 100084, Peoples R China
关键词
source address spoofing; IM; edge network;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In today's Internet routing architecture, the router doesn't validate the correctness of the source address carried in the packet, nor keep the state information when forwarding the packet. Thus the DDoS attacks with spoofed IP source address can cause security problems. In this paper, we aim to prevent the attackers from attacking somewhere outside the IPv6 edge network with forged source address in the fine granularity. The proposed methods include source address authentication by using session key and hash digest algorithm, and replay attack prevention by combining the sequence number method and the timestamp method. This paper presents the algorithm design and evaluates its feasibility and correctness by simulation experiments.
引用
收藏
页码:801 / +
页数:2
相关论文
共 50 条
  • [31] Approaches to detecting active network nodes in IPv6 address space
    Ivanov D.V.
    Moskvin D.A.
    Ovasapyan T.D.
    Automatic Control and Computer Sciences, 2017, 51 (8) : 902 - 906
  • [32] An IPv6 address fast scanning method based on local domain name association
    Fang, Yakai
    Zhang, Liancheng
    Li, Luyang
    Sun, Ce
    Guo, Yi
    Zhang, Hongtao
    Lin, Bin
    Wang, Jichang
    Xia, Wenhao
    SCIENTIFIC REPORTS, 2025, 15 (01):
  • [33] Survey on Target-Generated IPv6 Network Address Scanning
    Hou, Bingnan
    Liu, Ning
    Li, Xionglüe
    Zhou, Tongqing
    Chen, Yingwen
    Cai, Zhiping
    Lu, Kai
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (09): : 2307 - 2330
  • [34] Wireless residential network based on IPv6
    Kyntäjä, T
    Mischler, D
    Pfeifer, T
    Pärkkä, J
    5TH INTERNATIONAL SYMPOSIUM ON WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS, VOLS 1-3, PROCEEDINGS, 2002, : 596 - 600
  • [35] A growth-based address allocation scheme for IPv6
    Wang, M
    NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, 3462 : 671 - 683
  • [36] An Access Authentication Scheme Based on 2-HIBS in Proxy Mobile IPv6 Network
    Gao, Tianhan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (06): : 389 - 396
  • [37] Supporting address auto configuration for IPv6 in IEEE 802.16e based network
    Lee, Kyunghye
    Kim, Miyoung
    Kim, Gye-Young
    Mun, Youngsong
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 1, PROCEEDINGS, 2008, 5072 : 938 - 947
  • [38] Enable a trustworthy network by Source Address Spoofing Prevention routers: A formal description
    Bi, Jun
    Wu, Jianping
    Zhang, Miao
    EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 681 - 691
  • [39] A General Framework of Source Address Validation and Traceback for IPv4/IPv6 Transition Scenarios
    Hu, Guangwu
    Xu, Ke
    Wu, Jianping
    Cui, Yong
    Shi, Fan
    IEEE NETWORK, 2013, 27 (06): : 66 - 73
  • [40] Transition to the IPv6 network environment by using the SOCKS-based IPv6/IPv4 translator
    Kitamura, H
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2002, E85B (09) : 1740 - 1748