A study on path behavior characteristics of IPv6 based reflector attacks
Cites background from "A study on path behavior characteri..."
... establish a 6to4 experimental network to research the characteristics of reflection attacks leveraging 6to4 tunnels, as shown in Fig....
...In order to make the attacker accountable, traceback mechanisms that are used to identify the sources of the attack, such as ITRACE , probabilistic packet marking  and SPIE  are discussed....
"A study on path behavior characteri..." refers methods in this paper
...In this work we have considered the bandwidth based attacks that are highly distributed and difficult to identify: Distributed Reflector Denial of Service (DRDoS) attack (, ) using spoofed IPv6 flows....
Related Papers (5)
Vahid Aghaei Foroushani, A. Nur Zincir-Heywood
Wei-Tsung Su, Tzu-Chieh Lin +3 more
Lu Zhou, Mingchao Liao +3 more
L. Kavisankar, Chenniappan Chellappan +2 more