IPv6 Packet Traceback: A Survey

  • KumarSingh R
  • Pundir S
  • S. Pilli E
N/ACitations
Citations of this article
6Readers
Mendeley users who have this article in their library.

Abstract

The Internet is expanding year by year and providing services of convenience and commercial value. It is also becoming prone for many attacks. Every day, new vulnerabilities are found, new threats are detected and attacks are launched. We need countermeasures for these attacks and IDS and firewalls are not able to defend all the attacks. In this situation we need to traceback the attacker and get to the source of the attacker so that there is deterrence to the cyber criminals, thereby reducing attack rate. In this paper we survey various traceback techniques for IPv6 after introducing the same for IPv4. We also analyze the differences between packet header fields of IPv4 and v6 and list the challenges for IPv6 traceback. General Terms IP Traceback.

Cite

CITATION STYLE

APA

KumarSingh, R., Pundir, S., & S. Pilli, E. (2013). IPv6 Packet Traceback: A Survey. International Journal of Computer Applications, 74(16), 31–35. https://doi.org/10.5120/12971-0139

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free