• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

Computer Engineering & Science ›› 2025, Vol. 47 ›› Issue (8): 1391-1398.

• Computer Network and Znformation Security • Previous Articles     Next Articles

A large-scale scan of IPv6 IP-ID

HUANG Fengyuan,YANG Yifan,YU Bo,YANG Zhenzhong,CAI Zhiping,HOU Bingnan    

  1. (College of Computer Science and Technology,National University of Defense Technology,Changsha 410073,China)

  • Received:2024-10-18 Revised:2024-11-01 Online:2025-08-25 Published:2025-08-27

Abstract: In IPv6 networks,the Internet protocol identification (IP-ID) fields,which are used to support fragmentation and reassembly of network-layer datagrams,no longer appear as fixed fields but are instead placed in the extension header for flexible use.In recent years,researchers have exploited the IPv6 fragmentation mechanism to induce IPv6 target hosts to generate IP-IDs and perform tasks such as alias prefix resolution,demonstrating that the IP-ID field in IPv6 networks can still leak information and pose certain security risks.Since existing IP-ID exploitation methods rely on simple,predictable IP-ID types,probing whether the IP-ID types of IPv6 devices on the internet are predictable hold significant importance for IPv6 network security and asset assessment.This paper proposes a method to detect IPv6 devices on the Internet,and classifies them into different types.Among the nearly 5 million IPv6 addresses returned,41.1% of the addresses still used  predictable IP-ID,indicating that IPv6 networks are not immune to fragment and IP-ID based attacks.There are still a considerable number of devices in IPv6 network using predictable IP-ID which are of high security risk.

Key words: IPv6 protocol, IP identification(IP-ID) field, network measurement, network security