{"title":"SPIE-IPv6:单IPv6报文回溯","authors":"W. Strayer, C. Jones, F. Tchakountio, R. Hain","doi":"10.1109/LCN.2004.118","DOIUrl":null,"url":null,"abstract":"The source path isolation engine (SPIE), developed at BBN, provides accurate tracing of single IP packets through a network. The SPIE system calculates several small hash values for each packet as it traverses a router, then stores these values in a data structure called a Bloom filter. Given a packet and an approximate time that packet was in the network, the SPIE system queries routers along the potential reverse path; a packet was \"seen\" at a router if the Bloom filter has stored the packet's hash values. The SPIE system has been proven to work effectively and efficiently for IP version 4, largely because an IPv4 packet has sufficient entropy in the first 28 bytes to allow the hash functions to \"uniquely\" identify each packet. We extend the traceback architecture to IP version 6, with the interesting result that the packet structure of IPv6 does not provide as much entropy in the field values as IPv4.","PeriodicalId":366183,"journal":{"name":"29th Annual IEEE International Conference on Local Computer Networks","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2004-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"38","resultStr":"{\"title\":\"SPIE-IPv6: single IPv6 packet traceback\",\"authors\":\"W. Strayer, C. Jones, F. Tchakountio, R. Hain\",\"doi\":\"10.1109/LCN.2004.118\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The source path isolation engine (SPIE), developed at BBN, provides accurate tracing of single IP packets through a network. The SPIE system calculates several small hash values for each packet as it traverses a router, then stores these values in a data structure called a Bloom filter. Given a packet and an approximate time that packet was in the network, the SPIE system queries routers along the potential reverse path; a packet was \\\"seen\\\" at a router if the Bloom filter has stored the packet's hash values. The SPIE system has been proven to work effectively and efficiently for IP version 4, largely because an IPv4 packet has sufficient entropy in the first 28 bytes to allow the hash functions to \\\"uniquely\\\" identify each packet. We extend the traceback architecture to IP version 6, with the interesting result that the packet structure of IPv6 does not provide as much entropy in the field values as IPv4.\",\"PeriodicalId\":366183,\"journal\":{\"name\":\"29th Annual IEEE International Conference on Local Computer Networks\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2004-11-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"38\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"29th Annual IEEE International Conference on Local Computer Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/LCN.2004.118\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"29th Annual IEEE International Conference on Local Computer Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LCN.2004.118","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The source path isolation engine (SPIE), developed at BBN, provides accurate tracing of single IP packets through a network. The SPIE system calculates several small hash values for each packet as it traverses a router, then stores these values in a data structure called a Bloom filter. Given a packet and an approximate time that packet was in the network, the SPIE system queries routers along the potential reverse path; a packet was "seen" at a router if the Bloom filter has stored the packet's hash values. The SPIE system has been proven to work effectively and efficiently for IP version 4, largely because an IPv4 packet has sufficient entropy in the first 28 bytes to allow the hash functions to "uniquely" identify each packet. We extend the traceback architecture to IP version 6, with the interesting result that the packet structure of IPv6 does not provide as much entropy in the field values as IPv4.