A Lightweight IP Traceback Mechanism on IPv6

  • Syed Obaid Amin
  • Myung Soo Kang
  • Choong Seon Hong
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4097)


Due to the stateless nature of the internet, it is an intricate problem to determine the source of spoofed attacking packets. To handle this problem we utilize the IP traceback mechanism to know the actual source of an IP datagram. While many IP traceback techniques have been proposed but most of the previous studies focus and offer solutions for DDoS attacks done on IPv4 environment. Significant difference exists between IPv4 and IPv6 Networks. Therefore, the mechanisms for tracing the origin of attacks in IPv6 networks have abundant differences from those of IPv4 networks. In this paper, we proposed an efficient Lightweight IPv6 traceback algorithm. We also discussed the problems related to previously proposed IPv4 traceback schemes and presented the Error Correction and Modified Path MTU calculation algorithm to make our scheme more practical.


Path Information IPv6 Network State Explosion Problem Intermediate Router Error Correction Algorithm 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Belenky, A., Ansari, N.: On IP Traceback. IEEE Communications Magazine 41(7) (July 2003)Google Scholar
  2. 2.
    Savage, S., et al.: Network Support for IP Traceback. IEEE/ACM Trans. Net. 9(3), 226–237 (2001)CrossRefGoogle Scholar
  3. 3.
    Song, D.X., Perrig, A.: Advanced and authenticated marking schemes for IP traceback. In: Proceedings IEEE Infocomm 2001 (April 2001)Google Scholar
  4. 4.
    Park, K., Lee, H.: On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack, Tech. Rep. CSD-00-013, Department of Computer Sciences, Purdue University (June 2000)Google Scholar
  5. 5.
    Snoeren, A., Partridge, C., Sanchez, L., Jones, C., Tchakountio, F., Schwartz, B., Kent, S., Strayer, W.: Single-packet IP traceback. ACM/IEEE Transactions on Networking (December 2002)Google Scholar
  6. 6.
    Aljifri, H.: IP traceback: a new denial-of-service deterrent. Security & Privacy Magazine 1(3), 24–31 (2003)CrossRefGoogle Scholar
  7. 7.
    Waldvogel, M.: GOSSIB vs. IP Traceback Rumors. In: 18th Annual Computer Security Applications Conference (ACSAC 2002) (2002)Google Scholar
  8. 8.
    Strayer, W.T., Jones, C.E., Tchakountio, F., Hain, R.R.: SPIE-IPv6: Single IPv6 Packet Traceback, Local Computer Networks, 2004. In: 29th Annual IEEE International Conference, November 16-18, pp. 118–125 (2004)Google Scholar
  9. 9.
    Adler, M.: Tradeoffs in probabilistic packet marking for IP traceback. In: Proceedings of 34th ACM Symposium on Theory of Computing (STOC) (2002)Google Scholar
  10. 10.
    Belenky, A., Ansari, N.: On IP traceback. IEEE Communications Magazine 41(7) (July 2003)Google Scholar
  11. 11.
  12. 12.
  13. 13.
  14. 14.
  15. 15.
  16. 16.
    Deering, S., Hinden, R.: Internet Protocol, Version 6 (IPv6) Specification, RFC 2460, IETF (December 1998)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Syed Obaid Amin
    • 1
  • Myung Soo Kang
    • 1
  • Choong Seon Hong
    • 1
  1. 1.School of Electronics and InformationKyung Hee UniversityGyeonggiKorea

Personalised recommendations