SPIE-IPv6: Single IPv6 Packet Traceback

  • Authors:
  • W. Timothy Strayer;Christine E. Jones;Fabrice Tchakountio;Regina Rosales Hain

  • Affiliations:
  • BBN Technologies, Cambridge, MA;BBN Technologies, Cambridge, MA;BBN Technologies, Cambridge, MA;BBN Technologies, Cambridge, MA

  • Venue:
  • LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Source Path Isolation Engine (SPIE), developed at BBN, provides accurate tracing of single IP packets through a network. The SPIE system calculates several small hash values for each packet as it traverses a router, then stores these values in a data structure called a Bloom filter. Given a packet and an approximate time that packet was in the network, the SPIE system queries routers along the potential reverse path; a packet was "seen" at a router if the Bloom filter has stored the packetýs hash values. The SPIE system has been proven to work effectively and efficiently for IP version 4, largely because an IPv4 packet has sufficient entropy in the first 28 bytes to allow the hash functions to "uniquely" identify each packet. In this paper, we extend the traceback architecture to IP version 6, with the interesting result that the packet structure of IPv6 does not provide as much entropy in the field values as IPv4.