Abstract
Many IP traceback mechanisms have been proposed to identify the source of cyber-attacks in the IPv4-based network, the so-called Internet. However, most of existing traceback work is focused on responding to cyber-attacks in the IPv4-based network. Currently, the IPv4-based network is gradually transitioning to the Next Generation Network based on IPv6. In addition, considering the importance of mobility of a portable computer and/or machine, practical traceback techniques applicable to IPv6 and Mobile IPv6 environment will become more important in the near future. In this paper, we review typical existing traceback mechanisms and PMIPv6 technique briefly and propose a traceback mechanism which can identify the source of mobile attackers in IPv6 and PMIPv6 network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
IETF RFC 3775, Mobility Support in IPv6 (2004)
IETF RFC 3213, Proxy Mobile IPv6 (2008)
Bellovin, S., Leech, M., Taylor, T.: ICMP Traceback Messages (February 2003)
Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Schwartz, B., Kent, S.T., Timothy Strayer, W.: Single-Packet IP Traceback. IEEE/ACM Transactions on Networking, 721–734 (December 2002)
Timothy Strayer, W., Jones, C.E., Tchakountio, F., Hain, R.R.: SPIE-IPv6: Single IPv6 Packet Traceback. In: Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, pp. 118–125 (November 2004)
Lee, H.C.J., MA, M., Thing, V.L.L., Xu, Y.: On the Issues of IP Traceback for IPv6 and Mobile IPv6. In: Proceedings of the IEEE International Symposium on Computers and Communication, pp. 582–587 (July 2003)
Amin, S.O., Kang, M.S., Hong, C.S.: A Lightweight IP Traceback Mechanism on IPv6. In: Zhou, X., Sokolsky, O., Yan, L., Jung, E.-S., Shao, Z., Mu, Y., Lee, D.C., Kim, D.Y., Jeong, Y.-S., Xu, C.-Z. (eds.) EUC Workshops 2006. LNCS, vol. 4097, pp. 671–680. Springer, Heidelberg (2006)
Kim, R.-H., Jang, J.-H., Youm, H.-Y.: An Efficient IP Traceback mechanism for the NGN based on IPv6 Protocol. In: JWIS 2009 (August 2009)
IETF RFC-2827, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jang, Jh., Yeo, DG., Lee, Dh., Youm, HY. (2011). An IP Traceback Mechanism against Mobile Attacker for IPv6 and PMIPv6. In: Chung, Y., Yung, M. (eds) Information Security Applications. WISA 2010. Lecture Notes in Computer Science, vol 6513. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17955-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-17955-6_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17954-9
Online ISBN: 978-3-642-17955-6
eBook Packages: Computer ScienceComputer Science (R0)