Abstract
The dual semantics of IP address, representing not only the identifiers of nodes but also the locators of nodes, is one of the fundamental reasons for hindering the development of current Internet. Therefore, the identifier-locator split mapping network which separates the identifier role and the locator role of an IP address has become one of the most-watched techniques in the field of future Internet architecture. However, DDoS attacks are still in existence in this network. In this paper, by using the attack traffic we discuss and compare the effects of DDoS attacks between the current Internet and the identifier-locator split mapping network. In particular, the numerical analysis and simulation show that the identifier-locator split mapping network alleviates DDoS attacks more effectively, compared with the current Internet.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
BGP Report, http://bgp.potaroo.net/
http://www.cert.org.cn/articles/docs/common/2011042225342.shtml
Nakajima, N., Dutta, A., Das, S., et al.: Handoff delay analysis and measurement for SIP based mobility in IPv6. In: IEEE International Conference on Communications, vol. 2, pp. 1085–1089. IEEE Press, New York (2003)
Koodli, R.: IP Address Location Privacy and Mobile IPv6: Problem Statement. RFC 4882 (2007)
Feng, Q., Xiaoqian, L., Wei, S., et al.: A Novel Location Management Scheme based on DNS in Proxy Mobile IPv6. China Communications 7, 43–52 (2010)
Saltzer, J.: On the Naming and Binding of Network Destinations. RFC 1498 (1993)
Clark, D., Braden, R., Falk, A., et al.: FARA: Reorganizing the Addressing Architecture. In: Proc. ACM SIGCOMM Workshop on Future Directions in Network Architecture, FDNA, pp. 313–321. ACM Press, New York (2003)
Farinacci, D., Fuller, V., Meyer, D., et al.: Locator/ID Separation Protocol (LISP). Internet Draft, draft-farinacci-lisp-15.txt (2011)
Yumiba, H., Imai, K., Yabusaki, M.: IP-Based IMT Network Platform. IEEE Personal Communications Magazine 8(5), 18–23 (2001)
Okagawa, T., Nishida, K., Miura, A.: A Proposed Routing Procedure in IP2. In: Vehicular Technology Conference, vol. 3, pp. 2083–2087 (2003)
Whittle, R.: Ivip (Internet Vastly Improved Plumbing) Architecture. Internet Draft, draft-whittle-ivip-arch-04 (2010)
Adan, J.J.: Tunneled Inter-domain Routing (TIDR). Internet Draft, draft-adan-idr-tidr-01 (2006)
Hongke, Z., Wei, S.: Fundamental Research on the Architecture of New Network—Universal Network and Pervasive Services. Acta Electronica Sinica 35(4), 593–598 (2007)
Ping, D., Yajuan, Q., Hongke, Z.: Research on Universal Network Supporting Pervasive Services. Acta Electronica Sinica 35(4), 599–606 (2007) (in Chinese)
Moskowitz, R.: Host Identity Protocol Architecture (HIP). Internet Draft, draft-ietf-hip-rfc4423-bis-03 (2011)
Nikander, P., Arkko, J., Ohlman, B.: Host Identity Indirection Infrastructure. In: 2nd Swedish National Computer Networking Workshop, pp. 1–4. SNCNW Press, Swedish (2004)
Nordmark, E., Bagnulo, M.: Shim6: Level 3 Multihoming Shim Protocol for IPv6. RFC 5533 (2009)
Atkinson, R., Bhatti, S.: An Introduction to the Identifier-Locator Network Protocol (ILNP). In: London Communications Symposium (2006)
Atkinson, R.J.: ILNP Concept of Operations. Internet Draft, draft-rja-ilnp-intro-11 (2011)
Hussain, A., Heidemann, J., Papadppoulos, C.: A Framework for Classifying Denial of Service Attack. In: Proceedings of the ACM SIGCOMM Workshop on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 99–110. ACM Press, New York (2003)
Jiejun, K., Mirza, M., Shu, J., et al.: Random Flow Network Modeling and Simulations for DDoS Attack Mitigation. In: IEEE International Conference on Communications, vol. 1, pp. 487–491. IEEE Press, New York (2003)
Chunfeng, W., Hurwitz, J.G., Newman, H., et al.: Optimizing 10-Gigabit Ethernet for Networks of Workstations, Clusters, and Grids: A Case Study. In: Proceedings of the 2003 ACM/IEEE Conference on Supercomputing, pp. 50–62. IEEE Press, New York (2003)
OMNET++3.3, http://www.omnetpp.org
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Liu, Y., Tang, J., Zhang, H. (2013). Impact of Identifier-Locator Split Mechanism on DDoS Attacks. In: Pan, JS., Yang, CN., Lin, CC. (eds) Advances in Intelligent Systems and Applications - Volume 2. Smart Innovation, Systems and Technologies, vol 21. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35473-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-35473-1_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35472-4
Online ISBN: 978-3-642-35473-1
eBook Packages: EngineeringEngineering (R0)