Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3424978.3425020acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaeConference Proceedingsconference-collections
research-article

Research on DDoS Attacks in IPv6

Published: 20 October 2020 Publication History

Abstract

With the gradual replacement of IPv4 by IPv6, Distributed Denial-of-Service (DDoS) attacks that have plagued IPv4 appear in IPv6 more or less, and affect the normal operation of IPv6. However, the current research on how to construct a secure DDoS attack defense system under ipv6 is far away from satisfactory. This paper makes a detailed analysis of DDoS attacks from the aspect of causes, specific performance, architecture, classifies DDoS attacks according to the exploited vulnerabilities and analyzes the typical attack methods respectively. At the same time, the improvements and defects of IPv6 are further studied, along with the way to defend, summarizes how to defend against DDoS attacks in IPv6 from two aspects, and analyze the advantages and disadvantages of each scheme. Finally, how to build a more secure network security defense system in IPv6 is prospected.

References

[1]
Dhamdhere A, Luckie M, Huffaker B, et al. (2012). Measuring the deployment of IPv6: topology, routing and performance[C]. Proceedings of the 2012 ACM Conference on Internet Measurement Conference, ACM, 2012.
[2]
Sun C H and Liu B (2018). Survey on New Solutions Against Distributed Denial-of-service attacks. Acta Electronica Sinica, 37(7), 1562--1570.
[3]
Mirkovic J and Reiher P (2004). A taxonomy of DDoS attack and DDoS Defense mechanisms[J]. Acm Sigcomm Computer Communication Review, 2004, 34(2).
[4]
Gligor V D (1984). A Note on Denial-of-Service in Operating Systems[J]. IEEE Transactions on Software Engineering, 1984, SE-10(3), 320--324.
[5]
Dittrich D, Mirkovic J, Reiher P and Dietrich S (2004). Internet Denial of Service: Attack and Defense Mechanisms, http://books.google.com.br/books?id=qmdCs_Jf2AEC&pgis=1&redir_esc=y.
[6]
Douligeris Christos and Mitrokotsa Aikaterini (2004). DDoS attacks and defense mechanisms: Classification and state-of-the-art. Computer Networks, 44, 643--666.
[7]
Lin H Q, Li Z S, Yuan X L, et al. (2006). Research on Distributed Denial of Service Attacks and Defense[J]. Application Research of Computer, 2006(08), 142--144+157.
[8]
Peng T, Leckie C and Ramamohanarao K (2007). Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems[J]. ACM Computing Surveys, 39(1), p. 3.1--3.42.
[9]
Cisco Systems, Inc., Defining strategies to protect against TCP SYN Denial of Service attacks, http://ftp.ipsyn.net/pub/mirrors/cisco/public/cons/workshops/isp-workshop/TechTips/TCPSYNDoS.PDF.
[10]
Specht S M and Lee R B (2004). Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures[C]. Isca International Conference on Parallel & Distributed Computing Systems, DBLP, 2004.
[11]
Durda E and Buldu A (2010). IPV4/IPV6 security and threat comparisons[J]. Procedia - Social and Behavioral Sciences, 2(2), 5285--5291.
[12]
Netze H (2007). Using IPsec to Secure IPv6-in-IPv4 Tunnels[J]. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.638.4987&rep=rep1&type=pdf.
[13]
Narten T, Nordmark E and Simpson W (1998). Neighbor Discovery for IP Version 6 (IPv6), https://dl.acm.org/doi/book/10.17487/RFC2461.
[14]
Walfish M, Vutukuru M, Balakrishnan H, et al. (2010). DDoS defense by offense, https://dl.acm.org/doi/10.1145/1731060.1731063.
[15]
Katabi S, Jacob D and Burger M A (2005). Botz-4-sale: Surviving DDoS attacks that mimic flash crowds, https://dl.acm.org/doi/10.5555/1251203.1251224.
[16]
Adam G, Mark H and Felipe H (2005). Using Routing and Tunneling to Combat DoS Attacks, https://dl.acm.org/doi/10.5555/1251282.1251283.
[17]
Anderson T, Roscoe T and Wetherall D (2004). Preventing Internet denial-ofservice with capabilities[J]. ACM SIGCOMM Computer Communication Review, 34(1), 39.
[18]
Network Working Group, RFC2460 Internet protocol version6 (IPv6), https://datatracker.ietf.org/doc/rfc2460/.
[19]
Žagar Drago and Grgić Krešimir (2006). IPv6 Security Threats and Possible Solutions[C]. Automation Congress, 2006. WAC '06. World. IEEE, 2006.
[20]
Jianping S, Zhenxing W, Liancheng Z, et al. (2012). IPv6 packet header security threat and detection[J]. Application Research of Computers, 29(4), 1409--1412.
[21]
Shi Y and Sun Y (2014). Distributed Denial of Service Attack Defense System Survey[J]. Network & Computer Security, 2014, 000(007), 18--22.
[22]
John A and Sivakumar T (2009). DDoS: Survey of Traceback Methods[J]. International Journal of Recent Trends in Engineering, 2009(2), 241--245.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CSAE '20: Proceedings of the 4th International Conference on Computer Science and Application Engineering
October 2020
1038 pages
ISBN:9781450377720
DOI:10.1145/3424978
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 October 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. DDoS
  2. Defense technology
  3. DoS
  4. IPv6
  5. Network security

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

CSAE 2020

Acceptance Rates

CSAE '20 Paper Acceptance Rate 179 of 387 submissions, 46%;
Overall Acceptance Rate 368 of 770 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 406
    Total Downloads
  • Downloads (Last 12 months)53
  • Downloads (Last 6 weeks)4
Reflects downloads up to 28 Jan 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media