Call for Paper - April 2023 Edition
IJCA solicits original research papers for the April 2023 Edition. Last date of manuscript submission is March 20, 2023. Read More

IPv6 Packet Traceback: A Survey

International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 74 - Number 16
Year of Publication: 2013
Rajesh Kumar Singh
Sumit Pundir
Emmanuel S. Pilli

Rajesh Kumar Singh, Sumit Pundir and Emmanuel S Pilli. Article: IPv6 Packet Traceback: A Survey. International Journal of Computer Applications 74(16):31-35, July 2013. Full text available. BibTeX

	author = {Rajesh Kumar Singh and Sumit Pundir and Emmanuel S. Pilli},
	title = {Article: IPv6 Packet Traceback: A Survey},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {74},
	number = {16},
	pages = {31-35},
	month = {July},
	note = {Full text available}


The Internet is expanding year by year and providing services of convenience and commercial value. It is also becoming prone for many attacks. Every day, new vulnerabilities are found, new threats are detected and attacks are launched. We need countermeasures for these attacks and IDS and firewalls are not able to defend all the attacks. In this situation we need to traceback the attacker and get to the source of the attacker so that there is deterrence to the cyber criminals, thereby reducing attack rate. In this paper we survey various traceback techniques for IPv6 after introducing the same for IPv4. We also analyze the differences between packet header fields of IPv4 and v6 and list the challenges for IPv6 traceback.


  • H. Aljifri, "IP Traceback: A New Denial-of -Service Deterrent," IEEE Security & Privacy, pp. 24-31, 2003.
  • S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network Support for IP traceback," IEEE/ACM Trans. Networking, vol. 9, pp. 226-237, 2001.
  • A. Belenky, "On IP Traceback," IEEE Communication Magazine, vol. 41, no. 7, pp. 142-153, 2003.
  • L. Santhanam, A. Kumar, and D. P. Agrawal, "Taxonomy of IP Traceback," Journal of Information Assurance and security, vol. 2006, no. 1, pp. 79-94, 2006.
  • Z. Gao and N. Ansari, "Tracing Cyber Attacks from the Practical Perspective," IEEE Communication Magazine, pp. 123-131, 2005.
  • D. E. Comer, Internetworking With TCP/IP, 5 ed. vol. I: PHI Learning Private Limited.
  • "What is IPv6," Available: http://technet. microsoft. com/en-us/library/cc738582(v=ws. 10). aspx, [May 15, 2013]
  • Jivika Govil, Jivesh Govil, Navkeerat Kaur, and H. Kaur, "An Examination of IPv4 and IPv6 Networks: Constraints and Various Transition Mechanisms. ," pp. 178-185, 2008.
  • S. You-ye, Z. Cui, M. Shao-qing, and L. Kai-ning, "Modified Deterministic Packet Marking for DDoS Attack Traceback in IPv6 Network," in Computer and Information Technology (CIT), 2011 IEEE 11th International Conference on, 2011, pp. 245-248.
  • A. Tripathy, "A Secure Packet Marking Scheme for IP Traceback in IPv6," (ICACCI '12), 2012.
  • S. Obaid, "A novel IPv6 traceback architecture using COPS protocol," Ann. Telecommun, vol. 63, pp. 207-221, 2008.
  • Strayer WT, Jones CE, Tchakountio F, and H. RR, "SPIE-IPv6: single IPv6 packet traceback," IEEE International Conference on Local Computer Networks, pp. 118-125, 2004.
  • Hyung-Woo Lee and S. -H. Yun, "Authenticated IPv6 Packet Traceback Against Reflector Based Packet Flooding Attack," pp. 1118-1124, 2005.
  • S. Obaid, "On IPv6 Traceback," (ICACT '06), pp. 2139-2143, 2006.
  • S. Obaid, "A Lightweight IP Traceback Mechanism on IPv6," (IFIP '06), pp. 671-680, 2006.
  • S. Obaid, "IPv6 Traceback using Policy Based Management System," (KNOM '06), vol. 9, no. 2, 2006.
  • Y. Shi, "Deterministic link signature based IP traceback under IPv6," (ICACT '08), 2008.
  • RH Kim, JH Jang, and H. Youm, "An Efficient IP Traceback Mechanism for the NGN based on IPv6 Protocol," (IITA '09), 2009.
  • T. Ma, "A Link signature based DDoS attacker tracing algorithm under IPv6," (IJSA '09), vol. 3, no. 2, April 2009 2009.