Skip to main content
Log in

A novel IPv6 traceback architecture using COPS protocol

  • Original Paper
  • Published:
annals of telecommunications - annales des télécommunications Aims and scope Submit manuscript

Abstract

In any Distributed Denial of Service (DDoS) attack, invaders may use incorrect or spoofed Internet Protocol (IP) addresses in the attacking packets and thus disguise the actual origin of the attacks. This is primarily due to the stateless nature of the Internet. IP traceback algorithms provide mechanisms for identifying the true source of an IP datagram on the Internet ensuring at least the accountability of cyber attacks. While many IP traceback techniques have been proposed, most of the previous studies focus and offer solutions for DDoS attacks done on Internet Protocol version 4 (IPv4) environment. IPv4 and IPv6 networks differ greatly from each other, which urge the need of traceback techniques specifically tailored for IPv6 networks. In this paper, we propose a novel traceback architecture for IPv6 networks using Common Open-Policy Service and a novel packet-marking scheme. We also provide complete underlying protocol details required for traceback support in IPv6 networks. The proposed architecture is on demand and only single packet is required to traceback the attack.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Belenky A, Ansari N (2003) Tracing multiple attackers with deterministic packet marking (DPM). In: PACRIM 2003, 49–52, Aug

  2. Belenky A, Ansari N (2003) IP traceback with deterministic packet marking IEEE Commun Lett 7(4):162–164

    Article  Google Scholar 

  3. Savage S, Wetherall D, Karlin A, Anderson T (2001) Network support for IP traceback. IEEE/ACM Trans Net 9(3):226–37, June

    Article  Google Scholar 

  4. Belenky A, Ansari N (2003) On IP traceback. IEEE Commun Mag 41(7):142–153, July

    Article  Google Scholar 

  5. Mankin A, Massey D, Wu C, Wu S, Zhang L (2001) On design and evaluation of ‘intention-driven’ ICMP traceback. In: ICCCN Oct 2001, pp. 159–165

  6. Snoeren AC, Partridge C, Sanches LA, Jones CE, Tchakountio F, Kent ST, Strayer WT (2002) Single-packet IP traceback. ACM/IEEE Trans Netw 10(6):721–734

    Article  Google Scholar 

  7. Waldvogel M (2002) GOSSIB vs. IP traceback rumors. In: 18th Annual Computer Security Applications Conference (ACSAC 2002), pp. 5–13

  8. Deering S, Hinden R (1998) Internet protocol, version 6 (IPv6) specification. RFC 2460. IETF, Fremont, Dec

    Google Scholar 

  9. Convery S, Miller D (2004) IPv6 and IPv4 Threat Comparison and Best-Practice Evaluation (v1.0). http://www.cisco.com/web/about/security/security_services/ciag/documents/v6-v4-threats.pdf

  10. Westerinen A, Schnizlein J, Strassner J, Scherling M, Quinn B, Herzog S, Huynh A, Carlson M, Perry J, Waldbusse S (2001) Terminology for policy-based management, RFC3198. IETF Fremont, Nov

    Google Scholar 

  11. Mirkovic J, Reiher P (2004) A taxonomy of DDoS attack and DDoS defense mechanisms, ACM SIGCOMM Computer Communication Review, April

  12. Kent S, Atinkson R, Black D (1998) IP authentication header, RFC 2402. IETF, Fremont, Nov

    Google Scholar 

  13. Gong C, Le T, Korkmaz T, Sarac K (2005) Single Packet IP Traceback in AS-level Partial Deployment Scenario. In: IEEE GLOBECOM Nov 2005

  14. Carpenter B, Moore K (2001) Connection of IPv6 domains via IPv4 clouds, RFC 3056. IETF, Fremont, Feb

    Google Scholar 

  15. Durand A, Fasano P, Lento D (2001) IPv6 tunnel broker, RFC 3053. IETF, Fremont, Jan

    Google Scholar 

  16. Conta A, Deering S (1998) General packet tunneling in IPv6 specification, RFC 2473. IETF, Fremont, Dec

    Google Scholar 

  17. Durham D, Boyle J, Cohen R, Herzog S, Rajan R, Sastry A (2000) The COPS (Common Open Policy Service) protocol, RFC 2748. IETF, Fremont, Jan

    Google Scholar 

  18. Song B, Heo J, Hong CS (2007) Collaborative defense mechanism using statistical detection method against DDoS attacks. IEICE Trans Commun E90-B(10):2655–2664, Oct 1

    Article  Google Scholar 

  19. Barabasi AL, Albert R (1999) Emergence of scaling in random networks. Science 286:509–512, Oct

    Article  MathSciNet  Google Scholar 

  20. Korkmaz T, GongC, Sarac K, Dykes SG (2007) Single packet IP traceback in AS-level partial deployment scenario IJSN 2(1/2):95–108

    Article  Google Scholar 

  21. Strayer WT, Jones CE, Tchakountio F, Hain RR (2004) SPIE-IPv6: single IPv6 packet traceback. In: 29th Annual IEEE International Conference on Local Computer Networks 2004 Nov, pp. 118–125

Download references

Acknowledgements

This research was supported by MIC under the ITRC support program supervised by the IITA “(IITA-2007-(C1090–0701–0016))”. And Dr. CS Hong is the corresponding author.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Choong Seon Hong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Amin, S.O., Siddiqui, M.S. & Hong, C.S. A novel IPv6 traceback architecture using COPS protocol. Ann. Telecommun. 63, 207–221 (2008). https://doi.org/10.1007/s12243-008-0018-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-008-0018-5

Keywords

Navigation