On the issues of IP traceback for IPv6 and mobile IPv6

被引:4
作者
Lee, HCJ
Ma, M
Thing, VLL
Xu, Y
机构
来源
EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS | 2003年
关键词
D O I
10.1109/ISCC.2003.1214181
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet becomes pervasive, the vulnerability of some fundamental design aspects of the Internet has also become significant. Among which, Denial-of-Service (DoS) and Distributed DoS (DDoS) pose significant problems, as they are disruptive to the useful traffics and are hard to prevent. One solution consists in instituting accountability, which hold the attackers accountable for the attack. The key issue is to identify the "real" sources of the attacks as attackers use spoofed IP address to hide their actual network location. However, the Internet architecture does not provide intrinsic support for identifying the real sources of IP packets. Numerous mechanisms have been proposed to "traceback" the real sources. Most of-such works have been addressing the IP version 4. In this paper, we address the issues of IP traceback in the context of IPv6 and Mobile IPv6. This paper provides a detailed analysis of these issues and problems. The main problem lies with the transformations that are introduced by IPv6 and Mobile IPv6 protocols, namely tunneling and addresses manipulation. We then propose a solution, including new ICMPv6 messages for traceback co-ordination, to facilitate the traceback mechanism.
引用
收藏
页码:582 / 587
页数:6
相关论文
共 10 条
  • [1] Bellovin S., ICMP TRACEBACK MESSA
  • [2] CONTA, 1998, 2473 IETF
  • [3] CONTA S, 1998, 2463 IETF
  • [4] DEERING S, 1998, 2460 IETF
  • [5] Ferguson P., 2000, 2827 IETF
  • [6] Houle Kevin J., 2001, Trends in denial of service attack technology
  • [7] JOHNSON DB, 2002, MOBILITY SUPPORT IPV
  • [8] POSTEL J, 1981, REQUEST COMMENTS 079
  • [9] SAVAGE S, 2000, ACM SIGCOMM
  • [10] SNOEREN AC, 2001, ACM SIGCOMM 2001 AUG