• 中国计算机学会会刊
  • 中国科技核心期刊
  • 中文核心期刊

J4 ›› 2007, Vol. 29 ›› Issue (4): 11-13.

• 论文 • 上一篇    下一篇

IPv6下基于改进的SPIE源追踪方案

占勇军[1] 谢冬青[1,2] 周再红[1] 罗莉莉[1]   

  • 出版日期:2007-04-01 发布日期:2010-05-30

  • Online:2007-04-01 Published:2010-05-30

摘要:

源追踪技术提供对真实攻击来源的有效追踪,有利于实时阻断、隔离DDoS等网络攻击。目前的源追踪方法大多是使用IPv4包头中很少使用的16位标识域保存经过的路由器信息,不适用于IPv6环境。本文提出一种IPv6下基于改进的SPIE源追踪方案。该方法利用路由器,使用Bloom filters数据结构保存转发的数据包的摘要,减少了耗费的存储空间,同时时保护了数据包的机密性;它不但适合DDoS攻击的源追踪,还能进行单个数据包的源追踪。

关键词: IPv6 DDoS 源追踪 SPIE

Abstract:

IP traceback technologies judge the real locations of attacks and they can facilitate stopping on-going attacks. The current IP traceback technologies log the address of routers the packet passed by overloading the 16-bit IP Identification field used for fragmentation in the IPv4 header and they can not be applied to IPv6. In this paper, a new IP traceback scheme based on the improved SPIE in IPv6 is given, which logs audit trails for traffic within   the network by the Bloom filters. In addition to reducing the storage requirements,storing digests preserves traffic confidentiality. It is suitable for IP traceback in DDoS attacks together with tracing a single packet.

Key words: IPv6, DDoS, IP traceback, SPIE