IPv6 Packet Traceback: A Survey

Singh, Rajesh Kumar; Pundir, Sumit; Pilli, Emmanuel S.
July 2013
International Journal of Computer Applications;Jul2013, Vol. 74 Issue 1-21, p31
Academic Journal
The Internet is expanding year by year and providing services of convenience and commercial value. It is also becoming prone for many attacks. Every day, new vulnerabilities are found, new threats are detected and attacks are launched. We need countermeasures for these attacks and IDS and firewalls are not able to defend all the attacks. In this situation we need to traceback the attacker and get to the source of the attacker so that there is deterrence to the cyber criminals, thereby reducing attack rate. In this paper we survey various traceback techniques for IPv6 after introducing the same for IPv4. We also analyze the differences between packet header fields of IPv4 and v6 and list the challenges for IPv6 traceback.


Related Articles

  • ATTACK ON POPULAR FIREWALL PROGRAMS.  // PCWorld;Jun2004, Vol. 22 Issue 6, p55 

    This article reports on the worm attacks on firewall programs, BlackICE and RealSecure from Internet Security Systems. The worm named Witty replicates by sending copies of itself to randomly scanned Internet addresses, however, it infects only computers with one of these products running. ...

  • Place Your Trust in the New Perimeter. Blakley, Bob // Information Security;Jul/Aug2007, Vol. 10 Issue 7, p31 

    The author comments on the movement of the network perimeter from a few systems at the boundary of an Internet Protocol (IP) subnet onto endpoints in the form of personal firewalls and host-based IPS. He discusses the limitations of a network perimeter. He elaborates on the evolution of the...

  • LET'S GET PERSONAL--FIREWALLS. Schweitzer, Douglas // Certification Magazine;May2004, Vol. 6 Issue 5, p50 

    The article provides tips in using personal firewalls. Firewalls are the gatekeepers of the Internet. Simply put,a firewall is an electronic barrier designed to keep unauthorized computer programs or Internet users from accessing a private computer or network. With the exception of the built-in...

  • DNS, Worms Threaten VoIP. R. S. // Bank Technology News;Sep2006 Supplement, Vol. 19, p12 

    The article focuses on the importance of enterprise network, from Voice-over Internet Protocol (VoIP)-ready firewalls to secure Internet telephony in the U.S. It has cited that VoIP system could be securing Exchange Bank's existing network security appliance. Theft of service, forced...

  • Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly. Sunghyun Kim; Heejo Lee // KSII Transactions on Internet & Information Systems;Aug2010, Vol. 4 Issue 4, p671 

    The continuous growth of attacks in the Internet causes to generate a number of rules in security devices such as Intrusion Prevention Systems, firewalls, etc. Policy anomalies in security devices create security holes and prevent the system from determining quickly whether allow or deny a...

  • Everybody Get Inline. Rash, Michael // CRN;1/28/2008, Issue 1258, p36 

    The article offers information about iptables firewalls which give a full-features and stable packet filtering structure. Iptables offer protocol state tracking, network address translation, rate limiting and comprehensive logging. However, its main highlight is its capability to determine and...

  • ZoneAlarm Pro 3.0. Hitchcock, J.A.; Page, Loraine // Information Today;Nov2002, Vol. 19 Issue 10, p53 

    Reviews the firewall/Internet security program, ZoneAlarm Pro 3.0. How the Web site protects against Internet threats; Use of ten megabytes; Costs; Consideration that the program gets rid of pop-up advertisements.

  • VoIP vulnerability requires different security methods. Warren, Craig // Communications News;Nov2001, Vol. 38 Issue 11, p50 

    Discusses the security methods aimed to address the vulnerability of the voice-over-Internet protocol (VoIP) networks to hackers and denial-of-service attacks. Tasks of an enterprise network firewall; Hardware elements of an ideal firewall system; How the signaling elements of a VoIP network work.

  • DOES ENTERPRISE SIZE MATTER IN ACHIEVING INFORMATION SECURITY? Kim, Eyong B.; KBzullak, Michael // Review of Business Research;2008, Vol. 8 Issue 6, p41 

    Enterprises provide many different security measures to keep their information safe such as firewalls, anti-virus software, or biometrics. It is possible that larger enterprises could offer more sophisticated security measures and information security trainings to end users. In that regard, this...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics