Scalable Security Mechanisms for the Internet

نویسندگان

  • Angelos D. Keromytis
  • Sotiris Ioannidis
  • Michael B. Greenwald
  • Jonathan M. Smith
چکیده

The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for distributed control has not been achieved in the mechanisms for specifying and enforcing security policies. The STRONGMAN system described in this paper demonstrates three new approaches to providing efficient local policy enforcement complying with global security policies. First is the use of a compliance checker to provide great local autonomy within the constraints of a global security policy. Second is a mechanism to compose policy rules into a coherent enforceable set, e.g., at the boundaries of two locally autonomous application domains. Third is the "lazy instantiation" of policies to reduce the amount of state enforcement points need to maintain. We demonstrate the use of these approaches in the design, implementation and measurements of a distributed firewall. Comments University of Pennsylvania Department of Computer and Information Science Technical Report No. MSCIS-01-05. This technical report is available at ScholarlyCommons: http://repository.upenn.edu/cis_reports/148 Scalable Security Mechanisms for the Internet Angelos D. Keromytis, Sotiris Ioannidis, Michael B. Greenwald, Jonathan M. Smith {angelos,sotiris,mbgreen,jms}@dsl.cis.upenn.edu CIS Department University of Pennsylvania Abstract tributed firewall.tributed firewall. The design principle of restricting local autonomy

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intelligent scalable image watermarking robust against progressive DWT-based compression using genetic algorithms

Image watermarking refers to the process of embedding an authentication message, called watermark, into the host image to uniquely identify the ownership. In this paper a novel, intelligent, scalable, robust wavelet-based watermarking approach is proposed. The proposed approach employs a genetic algorithm to find nearly optimal positions to insert watermark. The embedding positions coded as chr...

متن کامل

A Fuzzy Based Three Color Meter/Marker for Diffserv Networks (RESEARCH NOTE)

Differentiated Services (Diffserv) which was proposed by Internet Engineering Task Force (IETF), is a scalable and robust model for providing the end-to-end QoS. In the Diffserv networks, metering mechanisms are used to measure traffic stream. The single rate Three Color Meter (srTCM) [1],which was proposed by IETF,‏ meters an IP packet stream and marks its packets either green, yellow, or red....

متن کامل

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

The Role of Trust Management in Distributed Systems Security

Existing authorization mechanisms fail to provide powerful and robust tools for handling security at the scale necessary for today's Internet. These mechanisms are coming under increasing strain from the development and deployment of systems that increase the programmability of the Internet. Moreover, this \increased exibility through programmability" trend seems to be accelerating with the adv...

متن کامل

Scalable Security Policy Mechanisms

The design principle of restricting local autonomy only where necessary for global robustness has led to a scalable Internet. Unfortunately, this scalability and capacity for distributed control has not been achieved in the mechanisms for specifying and enforcing security policies. The STRONGMAN system described in this paper demonstrates three new approaches to providing efficient local policy...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014