Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3424978.3425020acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

Research on DDoS Attacks in IPv6

Published: 20 October 2020 Publication History

Abstract

With the gradual replacement of IPv4 by IPv6, Distributed Denial-of-Service (DDoS) attacks that have plagued IPv4 appear in IPv6 more or less, and affect the normal operation of IPv6. However, the current research on how to construct a secure DDoS attack defense system under ipv6 is far away from satisfactory. This paper makes a detailed analysis of DDoS attacks from the aspect of causes, specific performance, architecture, classifies DDoS attacks according to the exploited vulnerabilities and analyzes the typical attack methods respectively. At the same time, the improvements and defects of IPv6 are further studied, along with the way to defend, summarizes how to defend against DDoS attacks in IPv6 from two aspects, and analyze the advantages and disadvantages of each scheme. Finally, how to build a more secure network security defense system in IPv6 is prospected.

References

[1]
Dhamdhere A, Luckie M, Huffaker B, et al. (2012). Measuring the deployment of IPv6: topology, routing and performance[C]. Proceedings of the 2012 ACM Conference on Internet Measurement Conference, ACM, 2012.
[2]
Sun C H and Liu B (2018). Survey on New Solutions Against Distributed Denial-of-service attacks. Acta Electronica Sinica, 37(7), 1562--1570.
[3]
Mirkovic J and Reiher P (2004). A taxonomy of DDoS attack and DDoS Defense mechanisms[J]. Acm Sigcomm Computer Communication Review, 2004, 34(2).
[4]
Gligor V D (1984). A Note on Denial-of-Service in Operating Systems[J]. IEEE Transactions on Software Engineering, 1984, SE-10(3), 320--324.
[5]
Dittrich D, Mirkovic J, Reiher P and Dietrich S (2004). Internet Denial of Service: Attack and Defense Mechanisms, http://books.google.com.br/books?id=qmdCs_Jf2AEC&pgis=1&redir_esc=y.
[6]
Douligeris Christos and Mitrokotsa Aikaterini (2004). DDoS attacks and defense mechanisms: Classification and state-of-the-art. Computer Networks, 44, 643--666.
[7]
Lin H Q, Li Z S, Yuan X L, et al. (2006). Research on Distributed Denial of Service Attacks and Defense[J]. Application Research of Computer, 2006(08), 142--144+157.
[8]
Peng T, Leckie C and Ramamohanarao K (2007). Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems[J]. ACM Computing Surveys, 39(1), p. 3.1--3.42.
[9]
Cisco Systems, Inc., Defining strategies to protect against TCP SYN Denial of Service attacks, http://ftp.ipsyn.net/pub/mirrors/cisco/public/cons/workshops/isp-workshop/TechTips/TCPSYNDoS.PDF.
[10]
Specht S M and Lee R B (2004). Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures[C]. Isca International Conference on Parallel & Distributed Computing Systems, DBLP, 2004.
[11]
Durda E and Buldu A (2010). IPV4/IPV6 security and threat comparisons[J]. Procedia - Social and Behavioral Sciences, 2(2), 5285--5291.
[12]
Netze H (2007). Using IPsec to Secure IPv6-in-IPv4 Tunnels[J]. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.638.4987&rep=rep1&type=pdf.
[13]
Narten T, Nordmark E and Simpson W (1998). Neighbor Discovery for IP Version 6 (IPv6), https://dl.acm.org/doi/book/10.17487/RFC2461.
[14]
Walfish M, Vutukuru M, Balakrishnan H, et al. (2010). DDoS defense by offense, https://dl.acm.org/doi/10.1145/1731060.1731063.
[15]
Katabi S, Jacob D and Burger M A (2005). Botz-4-sale: Surviving DDoS attacks that mimic flash crowds, https://dl.acm.org/doi/10.5555/1251203.1251224.
[16]
Adam G, Mark H and Felipe H (2005). Using Routing and Tunneling to Combat DoS Attacks, https://dl.acm.org/doi/10.5555/1251282.1251283.
[17]
Anderson T, Roscoe T and Wetherall D (2004). Preventing Internet denial-ofservice with capabilities[J]. ACM SIGCOMM Computer Communication Review, 34(1), 39.
[18]
Network Working Group, RFC2460 Internet protocol version6 (IPv6), https://datatracker.ietf.org/doc/rfc2460/.
[19]
Žagar Drago and Grgić Krešimir (2006). IPv6 Security Threats and Possible Solutions[C]. Automation Congress, 2006. WAC '06. World. IEEE, 2006.
[20]
Jianping S, Zhenxing W, Liancheng Z, et al. (2012). IPv6 packet header security threat and detection[J]. Application Research of Computers, 29(4), 1409--1412.
[21]
Shi Y and Sun Y (2014). Distributed Denial of Service Attack Defense System Survey[J]. Network & Computer Security, 2014, 000(007), 18--22.
[22]
John A and Sivakumar T (2009). DDoS: Survey of Traceback Methods[J]. International Journal of Recent Trends in Engineering, 2009(2), 241--245.

Index Terms

  1. Research on DDoS Attacks in IPv6

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSAE '20: Proceedings of the 4th International Conference on Computer Science and Application Engineering
    October 2020
    1038 pages
    ISBN:9781450377720
    DOI:10.1145/3424978
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 20 October 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. DDoS
    2. Defense technology
    3. DoS
    4. IPv6
    5. Network security

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    CSAE 2020

    Acceptance Rates

    CSAE '20 Paper Acceptance Rate 179 of 387 submissions, 46%;
    Overall Acceptance Rate 368 of 770 submissions, 48%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 406
      Total Downloads
    • Downloads (Last 12 months)53
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 28 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media