Panda: Verifying and enforcing network paths
نویسندگان
چکیده
We describe a new networking primitive, called a Path Verification Mechanism (PVM). There has been much recent work about how senders and receivers express policies about the paths that their packets take. For instance, users may want to choose providers whom they trust to be discreet, or a receiver may want traffic destined to it to travel through an intrusion detection service. While the ability to express policies has been well-studied, the ability to enforce policies has not. The core challenge is: if we assume an adversarial, decentralized, and high-speed environment, then when a packet arrives at a node, how can the node be sure that the packet followed an approved path? Our solution, Panda, incorporates an optimized cryptographic construction that is compact, and requires negligible configuration state and no PKI. We demonstrate Panda’s plausibility with a NetFPGA hardware implementation. At 86% more costly than an IP router on the same platform, its cost is significant but affordable. Indeed, our evaluation suggests that Panda can scale to backbone speeds.
منابع مشابه
Reachability Monitoring and Verification in Enterprise Networks
Enforcing correct reachability is crucial for an enterprise network to achieve access control, privacy, security and so on. Many sophisticated mechanisms such as router ACLs and firewalls have been developed to enforce the desired reachability. In addition, many other factors such as network dynamics can also impact the network reachability. Thus it is challenging to configure the reachability ...
متن کاملScaling limit for a drainage network model
We consider the two dimensional version of a drainage network model introduced by Gangopadhyay, Roy and Sarkar, and show that the appropriately rescaled family of its paths converges in distribution to the Brownian web. We do so by verifying the convergence criteria proposed by Fontes, Isopi, Newman and Ravishankar.
متن کاملOn the Resilience of Routing Tables
Many modern network designs incorporate “failover” paths into routers’ forwarding tables. In this paper, we formally address the conditions under which such resilient routing tables can guarantee delivery of packets.
متن کاملA Cloud - based Resource and Service Sharing Platform for Computer and Network Security Education
1. Automated Reasoning about Web Access Control Policies via Answer Set Programming Gail-Joon Ahn*, Joohyung Lee*, Hongxin Hu and Yunsong Meng Summary: We introduce a logic-based policy management approach for XACML (eXtensible Access Control Markup Language), which has become the defacto standard for specifying and enforcing access control policies for various applications and services in curr...
متن کاملExperimental evaluation of learning performance for exploring the shortest paths in hyperlink network of Wikipedia
In a 9-hour experiment we evaluated learning performance based on exploring the shortest paths in hyperlink network of Wikipedia online encyclopedia. Relying on network of 35688 unique hyperlinks in three separate learning sessions of 20 minutes students read series of 62 sentences built by using 22 unique hyperlinks that form the eleven shortest paths and answered pre-test and post-test multip...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011