A study on path behavior characteristics of IPv6 based reflector attacks
Citations
4 citations
Cites background from "A study on path behavior characteri..."
...[8] establish a 6to4 experimental network to research the characteristics of reflection attacks leveraging 6to4 tunnels, as shown in Fig....
[...]
References
447 citations
"A study on path behavior characteri..." refers background or methods in this paper
...In the work [9], Paxon has analyzed the threats posed by three types of reflectors namely DNS and Gnutelle servers, and TCP-based servers (particularly Web servers) running on TCP implementations....
[...]
...In this work we have considered the bandwidth based attacks that are highly distributed and difficult to identify: Distributed Reflector Denial of Service (DRDoS) attack ([3], [9]) using spoofed IPv6 flows....
[...]
...Also most of the defense mechanisms associated with end routers, transit routers and near to the attacker side are proved to be impractical ([9],[12]) due to vast deployment requirement and network administrative issues....
[...]
361 citations
51 citations
28 citations