Stack Overflow Based Defense for IPv6 Router Advertisement Flooding (DoS) Attack

Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 44)


Internet Protocol version 6 (IPv6) is the future for Internet. But still it has some serious security problems e.g., IPv6 Router advertisement (RA) flood. IPv6 Router advertisement (RA) flooding is a severe Denial of Service attack. In this attack using only single computer, attacker can attack all the computers connected to the Local area Network. As a result all victim machines get frozen and become unresponsive. In this chapter, we have described IPv6 RA flood attack in a test environment and its effects on victims. We proposed an effective solution to counter IPv6 RA flood attack by using a stack. The proposed system would use a stack at victim’s machine. All the incoming RA packets would be sent to this stack before they are processed by the system. After regular interval, RA packet would Pop up from the stack and would be sent for processing. The proposed approach would protect from the IPv6 RA flood, detect the attack and also raise an alarm to alert the user. This proposed approach can also be used to counter other DoS attacks with some modification. We have also provided an algorithm and experimental results in this chapter.


IPv6 Router advertisement flooding Stack overflow Cyber defense Network security DoS attack Flood_router26 


  1. 1.
    Droms, R.: Dynamic host configuration protocol. RFC1541. March (1997)Google Scholar
  2. 2.
    Deering, S.E.: Internet protocol version 6 (IPv6) specification. RFC2460. December (1998)Google Scholar
  3. 3.
    Rostaaski, M., Mushynskyy, T.: Security issues of IPv6 network autoconfiguration. In: Computer Information Systems and Industrial Management, pp. 218–228. Springer, Berlin (2013)Google Scholar
  4. 4.
    Narten, T., Nordmark, E., Simpson, W., Soliman, H.: Neighbor discovery for IP version 6 (IPv6). RFC4861. September (2007)Google Scholar
  5. 5.
    Deering, S.: ICMP router discovery messages. RFC 1256. September (1991)Google Scholar
  6. 6.
    Arkko, J., Aura, T., Kempf, J., Mntyl, V.M., Nikander, P., Roe, M.: Securing IPv6 neighbor and router discovery. In: Proceedings of the 1st ACM Workshop on Wireless Security, pp. 77–86 (2002)Google Scholar
  7. 7.
    Caicedo, C.E., Joshi, J.B., Tuladhar, S.R.: IPv6 security challenges. IEEE Comput. 42(2), 36–42 (2009)CrossRefGoogle Scholar
  8. 8.
    Lee, J.H., Ernst, T.: IPv6 security issues in cooperative intelligent transportation systems. Comput. J. bxs006 (2012)Google Scholar
  9. 9.
    Ullrich, J., Krombholz, K., Hobel, H., Dabrowski, A., Weippl, E.: IPv6 security: attacks and countermeasures in a nutshell. In: Proceedings of the 8th USENIX conference on Offensive Technologies. USENIX Association 2014, pp. 5–16 (2014)Google Scholar
  10. 10.
    Hermann, S., Fabian, B.: A comparison of internet protocol (IPv6) security guidelines. Future Internet. 6(1), 1–60 (2014)CrossRefGoogle Scholar
  11. 11.
    Nikander, P., Kempf, J., Nordmark, E.: IPv6 neighbor discovery (ND) trust models and threats. RFC 3756, Internet Engineering Task Force. May (2004)Google Scholar
  12. 12.
    Levy-Abegnoli, E., Van de Velde, G., Popoviciu, C., Mohacsi, J.: IPv6 router advertisement guard. RFC 6105, Internet Engineering Task Force. February (2011)Google Scholar
  13. 13.
    Chown, T., Venaas, S.: Rogue IPv6 router advertisement problem statement. RFC6104. February (2011)Google Scholar
  14. 14.
    Goel, J.N., Mehtre, B.M.: Dynamic IPv6 activation based defense for IPv6 router advertisement flooding (DoS) attack. In: 2014 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 628–632 (2014)Google Scholar
  15. 15.
  16. 16.
  17. 17.
    KALI Linux.
  18. 18.
    Hauser, V.: A complete tool set to attack the inherent protocol weaknesses of IPv6 and ICMPv6.

Copyright information

© Springer India 2016

Authors and Affiliations

  1. 1.School of Computer and Information SciencesUniversity of HyderabadHyderabadIndia
  2. 2.Center for Information Assurance and ManagementInstitute for Development and Research in Banking TechnologyHyderabadIndia

Personalised recommendations