Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 163))

Abstract

The new features introduced such as Auto-address configuration, End to End connectivity, mandatory support for security and mobility pose a great challenge on security for future networks based on IPv6. In this paper we mainly focus on the typical DoS/DDoS attacks under IPv6, which include TCP-Flood, UDP-Flood, ICMP-Flood and some other attacks based on IPv6 mechanism. We analysis the features of IPv6 and the DoS/DDoS methods above, and proposes a method to detect DoS/DDos attacks that involve TCP-Flood, UDP-Flood, ICMP-Flood, Duplicate Address Detection attack and based on routing header attacks under IPv6 environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (Brazil)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 429.00
Price excludes VAT (Brazil)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 549.99
Price excludes VAT (Brazil)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Deering S, Hinden R (1998) Internet protocol, Version6 (IPv6) specification, RFC2460, 42:19–21

    Google Scholar 

  2. Conta A, Deering S (1998) Internet control message protocol (ICMPv6) for the Internet protocol Version 6 (IPv6) specification, RFC2463, Internet Engineering Task Force, December

    Google Scholar 

  3. Narten T, Nordmark E, Simpson W (1998) Neighbor discovery for IP Version 6 (IPv6), RFC2641, Internet Engineering Task Force, December

    Google Scholar 

  4. Thomson S, Narten T (1998) IPv6 stateless address auto configuration, RFC2462, Internet Engineering Task Force, December

    Google Scholar 

  5. Kent S, Atkinson R (1998) IP authentication header, RFC 2402, Internet Engineering Task Force, November

    Google Scholar 

  6. Kent S, Atkinson R (1998) IP encapsulating security payload (ESP), RFC 2406, Internet Engineering Task Force, November

    Google Scholar 

  7. Jae-Deok Lim, Young-Ho Kim, Ki-Young Kim (2006) Packet filter algorithm to prevent the security hole of routing header in IPv6. SICE-ICASE international joint conference

    Google Scholar 

  8. **nyu Yang, Ting Ma, Yi Shi (2007) Typical DoS/DDoS threats under IPv6. In: Proceedings of the international multi-conference on computing in the Global Information Technology

    Google Scholar 

  9. Sean Convery, Darrin Miller (2004) IPv6 and IPv4 threat comparison and best-practice evaluation (v1.0). Presentation at the 17th NANOG, 24 May 2004

    Google Scholar 

  10. Mirkovic J, Reiher P (2005) D-WARD: a source-end defense against flooding denial-of-service attacks. IEEE Trans Depend Secure Comput 2:216–232

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jian Gao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this paper

Cite this paper

Gao, J., Chen, Y. (2014). Detecting DOS/DDOS Attacks Under Ipv6. In: Zhong, S. (eds) Proceedings of the 2012 International Conference on Cybernetics and Informatics. Lecture Notes in Electrical Engineering, vol 163. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-3872-4_110

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-3872-4_110

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-3871-7

  • Online ISBN: 978-1-4614-3872-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics

Navigation