Modified Deterministic Packet Marking for DDoS Attack Traceback in IPv6 Network
Although possible security threats were taken into consideration when IPv6 was formulated, attacks, especially distributed denial-of-service (DDoS), still exist in IPv6 network. This makes IP trace back schemes very relevant to the security of IPv6 network. As many current IP trace back schemes are...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 248 |
---|---|
container_issue | |
container_start_page | 245 |
container_title | |
container_volume | |
creator | You-ye Sun Cui Zhang Shao-qing Meng Kai-ning Lu |
description | Although possible security threats were taken into consideration when IPv6 was formulated, attacks, especially distributed denial-of-service (DDoS), still exist in IPv6 network. This makes IP trace back schemes very relevant to the security of IPv6 network. As many current IP trace back schemes are designed according to IPv4, they can not be directly used in IPv6 network. A modified Deterministic Packet Marking (DPM) for DDoS attack trace back in IPv6 network is presented in this work. This method is able to trace a huge number of simultaneous DDoS attackers. As the trace back process can be performed post-mortem, it can also trace the attacks that have not been noticed at first. Besides, it only takes a small amount of marked packets to complete the trace back process. It is also simple to implement and consumes practically no additional processing overhead on the network equipments. Although the initial motivation of modified DPM is to trace DDoS attack, it can also be used to filter anomaly traffic in IPv6 network. |
doi_str_mv | 10.1109/CIT.2011.59 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6036763</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6036763</ieee_id><sourcerecordid>6036763</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-406092ba91899c028d5c303bc5b477dde865d43db5b67be8c9581c73ec8595603</originalsourceid><addsrcrecordid>eNotjMFKAzEURSMiqHVWLt3kB1pfJpPkZVmmWgdaW3D2ZZK8SqydkUxQ_HsrejfnwIHL2K2AmRBg7-umnZUgxEzZM1ZYg2C0VZVExHN2LSplDEiU4pIV4_gGp2mNqPGKbdZDiPtIgS8oUzrGPo45er7t_IEyX3fpEPtXvh8SXyyGFz7P-VR4mzpP7tdiz5vtp-bPlL-GdLhhF_vufaTinxPWPj609dN0tVk29Xw1jRbytAINtnSdFWithxKD8hKk88pVxoRAqFWoZHDKaeMIvVUovJHkUVmlQU7Y3d9tJKLdR4rHLn3vTkEbLeUPfTBMvg</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Modified Deterministic Packet Marking for DDoS Attack Traceback in IPv6 Network</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>You-ye Sun ; Cui Zhang ; Shao-qing Meng ; Kai-ning Lu</creator><creatorcontrib>You-ye Sun ; Cui Zhang ; Shao-qing Meng ; Kai-ning Lu</creatorcontrib><description>Although possible security threats were taken into consideration when IPv6 was formulated, attacks, especially distributed denial-of-service (DDoS), still exist in IPv6 network. This makes IP trace back schemes very relevant to the security of IPv6 network. As many current IP trace back schemes are designed according to IPv4, they can not be directly used in IPv6 network. A modified Deterministic Packet Marking (DPM) for DDoS attack trace back in IPv6 network is presented in this work. This method is able to trace a huge number of simultaneous DDoS attackers. As the trace back process can be performed post-mortem, it can also trace the attacks that have not been noticed at first. Besides, it only takes a small amount of marked packets to complete the trace back process. It is also simple to implement and consumes practically no additional processing overhead on the network equipments. Although the initial motivation of modified DPM is to trace DDoS attack, it can also be used to filter anomaly traffic in IPv6 network.</description><identifier>ISBN: 1457703831</identifier><identifier>ISBN: 9781457703836</identifier><identifier>EISBN: 9780769543888</identifier><identifier>EISBN: 076954388X</identifier><identifier>DOI: 10.1109/CIT.2011.59</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer crime ; Convergence ; convergence time ; DDoS ; Destination Options Header ; DPM ; Encoding ; false positive rate ; IP networks ; IPv6 ; Probabilistic logic ; Routing</subject><ispartof>2011 IEEE 11th International Conference on Computer and Information Technology, 2011, p.245-248</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6036763$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6036763$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>You-ye Sun</creatorcontrib><creatorcontrib>Cui Zhang</creatorcontrib><creatorcontrib>Shao-qing Meng</creatorcontrib><creatorcontrib>Kai-ning Lu</creatorcontrib><title>Modified Deterministic Packet Marking for DDoS Attack Traceback in IPv6 Network</title><title>2011 IEEE 11th International Conference on Computer and Information Technology</title><addtitle>cit</addtitle><description>Although possible security threats were taken into consideration when IPv6 was formulated, attacks, especially distributed denial-of-service (DDoS), still exist in IPv6 network. This makes IP trace back schemes very relevant to the security of IPv6 network. As many current IP trace back schemes are designed according to IPv4, they can not be directly used in IPv6 network. A modified Deterministic Packet Marking (DPM) for DDoS attack trace back in IPv6 network is presented in this work. This method is able to trace a huge number of simultaneous DDoS attackers. As the trace back process can be performed post-mortem, it can also trace the attacks that have not been noticed at first. Besides, it only takes a small amount of marked packets to complete the trace back process. It is also simple to implement and consumes practically no additional processing overhead on the network equipments. Although the initial motivation of modified DPM is to trace DDoS attack, it can also be used to filter anomaly traffic in IPv6 network.</description><subject>Computer crime</subject><subject>Convergence</subject><subject>convergence time</subject><subject>DDoS</subject><subject>Destination Options Header</subject><subject>DPM</subject><subject>Encoding</subject><subject>false positive rate</subject><subject>IP networks</subject><subject>IPv6</subject><subject>Probabilistic logic</subject><subject>Routing</subject><isbn>1457703831</isbn><isbn>9781457703836</isbn><isbn>9780769543888</isbn><isbn>076954388X</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotjMFKAzEURSMiqHVWLt3kB1pfJpPkZVmmWgdaW3D2ZZK8SqydkUxQ_HsrejfnwIHL2K2AmRBg7-umnZUgxEzZM1ZYg2C0VZVExHN2LSplDEiU4pIV4_gGp2mNqPGKbdZDiPtIgS8oUzrGPo45er7t_IEyX3fpEPtXvh8SXyyGFz7P-VR4mzpP7tdiz5vtp-bPlL-GdLhhF_vufaTinxPWPj609dN0tVk29Xw1jRbytAINtnSdFWithxKD8hKk88pVxoRAqFWoZHDKaeMIvVUovJHkUVmlQU7Y3d9tJKLdR4rHLn3vTkEbLeUPfTBMvg</recordid><startdate>201108</startdate><enddate>201108</enddate><creator>You-ye Sun</creator><creator>Cui Zhang</creator><creator>Shao-qing Meng</creator><creator>Kai-ning Lu</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201108</creationdate><title>Modified Deterministic Packet Marking for DDoS Attack Traceback in IPv6 Network</title><author>You-ye Sun ; Cui Zhang ; Shao-qing Meng ; Kai-ning Lu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-406092ba91899c028d5c303bc5b477dde865d43db5b67be8c9581c73ec8595603</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Computer crime</topic><topic>Convergence</topic><topic>convergence time</topic><topic>DDoS</topic><topic>Destination Options Header</topic><topic>DPM</topic><topic>Encoding</topic><topic>false positive rate</topic><topic>IP networks</topic><topic>IPv6</topic><topic>Probabilistic logic</topic><topic>Routing</topic><toplevel>online_resources</toplevel><creatorcontrib>You-ye Sun</creatorcontrib><creatorcontrib>Cui Zhang</creatorcontrib><creatorcontrib>Shao-qing Meng</creatorcontrib><creatorcontrib>Kai-ning Lu</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>You-ye Sun</au><au>Cui Zhang</au><au>Shao-qing Meng</au><au>Kai-ning Lu</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Modified Deterministic Packet Marking for DDoS Attack Traceback in IPv6 Network</atitle><btitle>2011 IEEE 11th International Conference on Computer and Information Technology</btitle><stitle>cit</stitle><date>2011-08</date><risdate>2011</risdate><spage>245</spage><epage>248</epage><pages>245-248</pages><isbn>1457703831</isbn><isbn>9781457703836</isbn><eisbn>9780769543888</eisbn><eisbn>076954388X</eisbn><abstract>Although possible security threats were taken into consideration when IPv6 was formulated, attacks, especially distributed denial-of-service (DDoS), still exist in IPv6 network. This makes IP trace back schemes very relevant to the security of IPv6 network. As many current IP trace back schemes are designed according to IPv4, they can not be directly used in IPv6 network. A modified Deterministic Packet Marking (DPM) for DDoS attack trace back in IPv6 network is presented in this work. This method is able to trace a huge number of simultaneous DDoS attackers. As the trace back process can be performed post-mortem, it can also trace the attacks that have not been noticed at first. Besides, it only takes a small amount of marked packets to complete the trace back process. It is also simple to implement and consumes practically no additional processing overhead on the network equipments. Although the initial motivation of modified DPM is to trace DDoS attack, it can also be used to filter anomaly traffic in IPv6 network.</abstract><pub>IEEE</pub><doi>10.1109/CIT.2011.59</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1457703831 |
ispartof | 2011 IEEE 11th International Conference on Computer and Information Technology, 2011, p.245-248 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6036763 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Computer crime Convergence convergence time DDoS Destination Options Header DPM Encoding false positive rate IP networks IPv6 Probabilistic logic Routing |
title | Modified Deterministic Packet Marking for DDoS Attack Traceback in IPv6 Network |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-21T15%3A00%3A09IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Modified%20Deterministic%20Packet%20Marking%20for%20DDoS%20Attack%20Traceback%20in%20IPv6%20Network&rft.btitle=2011%20IEEE%2011th%20International%20Conference%20on%20Computer%20and%20Information%20Technology&rft.au=You-ye%20Sun&rft.date=2011-08&rft.spage=245&rft.epage=248&rft.pages=245-248&rft.isbn=1457703831&rft.isbn_list=9781457703836&rft_id=info:doi/10.1109/CIT.2011.59&rft_dat=%3Cieee_6IE%3E6036763%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769543888&rft.eisbn_list=076954388X&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6036763&rfr_iscdi=true |