CFP last date
20 March 2024
Reseach Article

IPv6 Packet Traceback: A Survey

by Rajesh Kumar Singh, Sumit Pundir, Emmanuel S. Pilli
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 16
Year of Publication: 2013
Authors: Rajesh Kumar Singh, Sumit Pundir, Emmanuel S. Pilli
10.5120/12971-0139

Rajesh Kumar Singh, Sumit Pundir, Emmanuel S. Pilli . IPv6 Packet Traceback: A Survey. International Journal of Computer Applications. 74, 16 ( July 2013), 31-35. DOI=10.5120/12971-0139

@article{ 10.5120/12971-0139,
author = { Rajesh Kumar Singh, Sumit Pundir, Emmanuel S. Pilli },
title = { IPv6 Packet Traceback: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 16 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number16/12971-0139/ },
doi = { 10.5120/12971-0139 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:42:29.769605+05:30
%A Rajesh Kumar Singh
%A Sumit Pundir
%A Emmanuel S. Pilli
%T IPv6 Packet Traceback: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 16
%P 31-35
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Internet is expanding year by year and providing services of convenience and commercial value. It is also becoming prone for many attacks. Every day, new vulnerabilities are found, new threats are detected and attacks are launched. We need countermeasures for these attacks and IDS and firewalls are not able to defend all the attacks. In this situation we need to traceback the attacker and get to the source of the attacker so that there is deterrence to the cyber criminals, thereby reducing attack rate. In this paper we survey various traceback techniques for IPv6 after introducing the same for IPv4. We also analyze the differences between packet header fields of IPv4 and v6 and list the challenges for IPv6 traceback.

References
  1. H. Aljifri, "IP Traceback: A New Denial-of -Service Deterrent," IEEE Security & Privacy, pp. 24-31, 2003.
  2. S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Network Support for IP traceback," IEEE/ACM Trans. Networking, vol. 9, pp. 226-237, 2001.
  3. A. Belenky, "On IP Traceback," IEEE Communication Magazine, vol. 41, no. 7, pp. 142-153, 2003.
  4. L. Santhanam, A. Kumar, and D. P. Agrawal, "Taxonomy of IP Traceback," Journal of Information Assurance and security, vol. 2006, no. 1, pp. 79-94, 2006.
  5. Z. Gao and N. Ansari, "Tracing Cyber Attacks from the Practical Perspective," IEEE Communication Magazine, pp. 123-131, 2005.
  6. D. E. Comer, Internetworking With TCP/IP, 5 ed. vol. I: PHI Learning Private Limited.
  7. "What is IPv6," Available: http://technet. microsoft. com/en-us/library/cc738582(v=ws. 10). aspx, [May 15, 2013]
  8. Jivika Govil, Jivesh Govil, Navkeerat Kaur, and H. Kaur, "An Examination of IPv4 and IPv6 Networks: Constraints and Various Transition Mechanisms. ," pp. 178-185, 2008.
  9. S. You-ye, Z. Cui, M. Shao-qing, and L. Kai-ning, "Modified Deterministic Packet Marking for DDoS Attack Traceback in IPv6 Network," in Computer and Information Technology (CIT), 2011 IEEE 11th International Conference on, 2011, pp. 245-248.
  10. A. Tripathy, "A Secure Packet Marking Scheme for IP Traceback in IPv6," (ICACCI '12), 2012.
  11. S. Obaid, "A novel IPv6 traceback architecture using COPS protocol," Ann. Telecommun, vol. 63, pp. 207-221, 2008.
  12. Strayer WT, Jones CE, Tchakountio F, and H. RR, "SPIE-IPv6: single IPv6 packet traceback," IEEE International Conference on Local Computer Networks, pp. 118-125, 2004.
  13. Hyung-Woo Lee and S. -H. Yun, "Authenticated IPv6 Packet Traceback Against Reflector Based Packet Flooding Attack," pp. 1118-1124, 2005.
  14. S. Obaid, "On IPv6 Traceback," (ICACT '06), pp. 2139-2143, 2006.
  15. S. Obaid, "A Lightweight IP Traceback Mechanism on IPv6," (IFIP '06), pp. 671-680, 2006.
  16. S. Obaid, "IPv6 Traceback using Policy Based Management System," (KNOM '06), vol. 9, no. 2, 2006.
  17. Y. Shi, "Deterministic link signature based IP traceback under IPv6," (ICACT '08), 2008.
  18. RH Kim, JH Jang, and H. Youm, "An Efficient IP Traceback Mechanism for the NGN based on IPv6 Protocol," (IITA '09), 2009.
  19. T. Ma, "A Link signature based DDoS attacker tracing algorithm under IPv6," (IJSA '09), vol. 3, no. 2, April 2009 2009.
Index Terms

Computer Science
Information Sciences

Keywords

IPv4 IPv6 DoS DDos traceback