Skip to main content

Impact of Identifier-Locator Split Mechanism on DDoS Attacks

  • Conference paper
Advances in Intelligent Systems and Applications - Volume 2

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 21))

  • 2874 Accesses

Abstract

The dual semantics of IP address, representing not only the identifiers of nodes but also the locators of nodes, is one of the fundamental reasons for hindering the development of current Internet. Therefore, the identifier-locator split mapping network which separates the identifier role and the locator role of an IP address has become one of the most-watched techniques in the field of future Internet architecture. However, DDoS attacks are still in existence in this network. In this paper, by using the attack traffic we discuss and compare the effects of DDoS attacks between the current Internet and the identifier-locator split mapping network. In particular, the numerical analysis and simulation show that the identifier-locator split mapping network alleviates DDoS attacks more effectively, compared with the current Internet.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. BGP Report, http://bgp.potaroo.net/

  2. http://www.cert.org.cn/articles/docs/common/2011042225342.shtml

  3. Nakajima, N., Dutta, A., Das, S., et al.: Handoff delay analysis and measurement for SIP based mobility in IPv6. In: IEEE International Conference on Communications, vol. 2, pp. 1085–1089. IEEE Press, New York (2003)

    Google Scholar 

  4. Koodli, R.: IP Address Location Privacy and Mobile IPv6: Problem Statement. RFC 4882 (2007)

    Google Scholar 

  5. Feng, Q., Xiaoqian, L., Wei, S., et al.: A Novel Location Management Scheme based on DNS in Proxy Mobile IPv6. China Communications 7, 43–52 (2010)

    Google Scholar 

  6. Saltzer, J.: On the Naming and Binding of Network Destinations. RFC 1498 (1993)

    Google Scholar 

  7. Clark, D., Braden, R., Falk, A., et al.: FARA: Reorganizing the Addressing Architecture. In: Proc. ACM SIGCOMM Workshop on Future Directions in Network Architecture, FDNA, pp. 313–321. ACM Press, New York (2003)

    Chapter  Google Scholar 

  8. Farinacci, D., Fuller, V., Meyer, D., et al.: Locator/ID Separation Protocol (LISP). Internet Draft, draft-farinacci-lisp-15.txt (2011)

    Google Scholar 

  9. Yumiba, H., Imai, K., Yabusaki, M.: IP-Based IMT Network Platform. IEEE Personal Communications Magazine 8(5), 18–23 (2001)

    Article  Google Scholar 

  10. Okagawa, T., Nishida, K., Miura, A.: A Proposed Routing Procedure in IP2. In: Vehicular Technology Conference, vol. 3, pp. 2083–2087 (2003)

    Google Scholar 

  11. Whittle, R.: Ivip (Internet Vastly Improved Plumbing) Architecture. Internet Draft, draft-whittle-ivip-arch-04 (2010)

    Google Scholar 

  12. Adan, J.J.: Tunneled Inter-domain Routing (TIDR). Internet Draft, draft-adan-idr-tidr-01 (2006)

    Google Scholar 

  13. Hongke, Z., Wei, S.: Fundamental Research on the Architecture of New Network—Universal Network and Pervasive Services. Acta Electronica Sinica 35(4), 593–598 (2007)

    Google Scholar 

  14. Ping, D., Yajuan, Q., Hongke, Z.: Research on Universal Network Supporting Pervasive Services. Acta Electronica Sinica 35(4), 599–606 (2007) (in Chinese)

    Google Scholar 

  15. Moskowitz, R.: Host Identity Protocol Architecture (HIP). Internet Draft, draft-ietf-hip-rfc4423-bis-03 (2011)

    Google Scholar 

  16. Nikander, P., Arkko, J., Ohlman, B.: Host Identity Indirection Infrastructure. In: 2nd Swedish National Computer Networking Workshop, pp. 1–4. SNCNW Press, Swedish (2004)

    Google Scholar 

  17. Nordmark, E., Bagnulo, M.: Shim6: Level 3 Multihoming Shim Protocol for IPv6. RFC 5533 (2009)

    Google Scholar 

  18. Atkinson, R., Bhatti, S.: An Introduction to the Identifier-Locator Network Protocol (ILNP). In: London Communications Symposium (2006)

    Google Scholar 

  19. Atkinson, R.J.: ILNP Concept of Operations. Internet Draft, draft-rja-ilnp-intro-11 (2011)

    Google Scholar 

  20. Hussain, A., Heidemann, J., Papadppoulos, C.: A Framework for Classifying Denial of Service Attack. In: Proceedings of the ACM SIGCOMM Workshop on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 99–110. ACM Press, New York (2003)

    Google Scholar 

  21. Jiejun, K., Mirza, M., Shu, J., et al.: Random Flow Network Modeling and Simulations for DDoS Attack Mitigation. In: IEEE International Conference on Communications, vol. 1, pp. 487–491. IEEE Press, New York (2003)

    Google Scholar 

  22. Chunfeng, W., Hurwitz, J.G., Newman, H., et al.: Optimizing 10-Gigabit Ethernet for Networks of Workstations, Clusters, and Grids: A Case Study. In: Proceedings of the 2003 ACM/IEEE Conference on Supercomputing, pp. 50–62. IEEE Press, New York (2003)

    Google Scholar 

  23. OMNET++3.3, http://www.omnetpp.org

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ying Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Liu, Y., Tang, J., Zhang, H. (2013). Impact of Identifier-Locator Split Mechanism on DDoS Attacks. In: Pan, JS., Yang, CN., Lin, CC. (eds) Advances in Intelligent Systems and Applications - Volume 2. Smart Innovation, Systems and Technologies, vol 21. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35473-1_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35473-1_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35472-4

  • Online ISBN: 978-3-642-35473-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics