Security in Active Networks
نویسندگان
چکیده
The desire for exible networking services has given rise to the concept of \active networks." Active networks provide a general framework for designing and implementing network-embedded services, typically by means of a programmable network infrastructure. A programmable network infrastructure creates signi cant new challenges for securing the network infrastructure. This paper begins with an overview of active networking. It then moves to security issues, beginning with a threat model for active networking, moving through an enumeration of the challenges for system designers, and ending with a survey of approaches for meeting those challenges. The Secure Active Networking Environment (SANE) realizes many of these approaches; an implementation exists and provides acceptable performance for even the most aggressive active networking proposals such as active packets (sometimes called \capsules"). We close the paper with a discussion of open problems and an attempt to prioritize them. 1 What is Active Networking ? In networking architectures a design choice can be made between: 1. Restricting the actions of the network infrastructure to transport, and 2. easing those restrictions to permit on-they customization of the network infrastructure. The data-transport model, which has been successfully applied in the IP Internet and other networks, is called passive networking since the infrastructure (e.g., IP routers) is mostly indi erent to the packets passing through, and their actions (forwarding and routing) cannot be directly in uenced by users. This is not to say that the switches do not perform complex computations as a result of receiving or forwarding a packet. Rather, the nature of these computations cannot dynamically change beyond the fairly basic con guration options provided by the manufacturer of the switch. In contrast, active networking allows network-embedded functionality other than transport. For current systems, this functionality ranges from WWW proxy caches, multicasting [Dee89] and RSVP [BZB97] to rewalls. Since each of these independently designed and supported functions could be carried out as an application of a more general infrastructure, the architecture of such active infrastructures is now being investigated aggressively. The basic principle employed is the use of programmability, as this allows many applications to be created, including those not foreseen by the designers of the switch. There are a number of forms this programmability can take, including treating each packet as a program (active packets or \capsules") and programming or reprogramming network elements on-they with select packets. Note that the latter approach subsumes the former, as a program may be loaded that treats all subsequent packets as programs. 1.1 Why is Active Network Security Interesting? From a security perspective, a large scale infrastructure with user access to programming capabilities, even if restricted, creates a wide variety of di cult challenges. Most directly, since the basis of security is controlled access to resources, the increased complexity of the managed resources makes securing them much more di cult. Since \security" is best thought of as a mapping between a policy and a set of predicates maintained through actions, the policy must be more complex than, in as much as they exist, equivalent policies of present-day networks, resulting in an explosion in the set of predicates. For example, the ability to load a new queuing discipline may be attractive from a resource control perspective, but if the queuing discipline can replace that of an existing user, the replacement policy must be speci ed, and its implementation carefully controlled through one or more policy enforcement mechanisms. Additionally, such a scenario forces the de nition of principals and objects with which policies are associated. When compared with the policy at a basic IP router (no principals, datagram delivery guarantees, FIFO queuing, etc.) it can be seen why securing active networks is di cult. 1.2 Virtual and Real Resources As the role of active networking elements is to store, compute and forward, the managed resources are those required to store packets, operate on them, and forward them to other elements. The resources provided to various principals at any instant cannot exceed the real resources (e.g., output port bandwidth) available at that instant. This emphasis on real resources and time implies that a conventional 3-tuple for an access control list (ACL) is inadequate. To provide controlled access to real resources, with real time constraints, a fourth element to represent duration (either absolute or periodic) must be added, giving . This remains an ACL, but is not \virtualized" by leaving time unspeci ed and making \eventual" access acceptable. We should point out that this new element in the ACL can be encoded as part of the access eld. Similarly, we need not use an actual ACL, but we may use mechanisms that can be expressed in terms of ACLS and are better-suited for distributed systems.
منابع مشابه
Survey the Security Function of Integration of vehicular ad hoc Networks with Software-defiend Networks
In recent years, Vehicular Ad Hoc Networks (VANETs) have emerged as one of the most active areas in the field of technology to provide a wide range of services, including road safety, passenger's safety, amusement facilities for passengers and emergency facilities. Due to the lack of flexibility, complexity and high dynamic network topology, the development and management of current Vehicular A...
متن کاملDetecting Active Bot Networks Based on DNS Traffic Analysis
Abstract—One of the serious threats to cyberspace is the Bot networks or Botnets. Bots are malicious software that acts as a network and allows hackers to remotely manage and control infected computer victims. Given the fact that DNS is one of the most common protocols in the network and is essential for the proper functioning of the network, it is very useful for monitoring, detecting and redu...
متن کاملPlanning and Operation of the Active and Reactive sources Constrained to Voltage Security in the Reconfigurable Smart Distribution Network
One of the most important objectives of smart distribution networks (SDNs) is to achieve a secure and reliable network. This can be realized by optimal operation in the presence of active power sources such as the distributed generations (DGs), reactive power sources such as switched capacitor bank (SCB), active loads such as the demand response program (DRP), and various network management str...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملInterdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملA Lightweight Intrusion Detection System Based on Specifications to Improve Security in Wireless Sensor Networks
Due to the prevalence of Wireless Sensor Networks (WSNs) in the many mission-critical applications such as military areas, security has been considered as one of the essential parameters in Quality of Service (QoS), and Intrusion Detection System (IDS) is considered as a fundamental requirement for security in these networks. This paper presents a lightweight Intrusion Detection System to prote...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1999