IP easy-pass: Edge resource access control

被引:0
|
作者
Wang, HN [1 ]
Bose, A [1 ]
El-Gendy, M [1 ]
Shin, KG [1 ]
机构
[1] Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23187 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing real-time communication services to multimedia applications and subscription-based Internet access often requires sufficient network resources to be reserved for real-time traffic. However, the reserved network resource is susceptible to resource theft and abuse. Without a resource access control mechanism that can efficiently differentiate legitimate real-time traffic from attacking packets, the traffic conditioning and policing enforced at ISP (Internet Service Provider) edge routers cannot protect the reserved network resource from embezzlement. On the contrary, the traffic policing at edge routers aggravates their vulnerability to flooding attacks by blindly dropping packets. In this paper, we propose a fast and light-weighted IP network-edge resource access control mechanism, called IP Easy-pass, to prevent unauthorized access to reserved network resources at edge devices. We attach a unique pass to each legitimate real-time packet so that an ISP edge router can validate the legitimacy of an incoming IP packet very quickly and simply by checking its pass. We present the generation of Easy-pass, its embedding, and verification procedures. We implement the IP Easy-pass mechanism in the Linux kernel, analyze its effectiveness against packet forgery and resource embezzlement attempts. Finally, we measure the overhead incurred by Easy-pass.
引用
收藏
页码:2583 / 2593
页数:11
相关论文
共 50 条
  • [1] IP Easy-pass:: A light-weight network-edge resource access control
    Wang, HN
    Bose, A
    El-Gendy, M
    Shin, KG
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2005, 13 (06) : 1247 - 1260
  • [2] Making Access Control Easy in IoT
    Andalibi, Vafa
    Dev, Jayati
    Kim, DongInn
    Lear, Eliot
    Camp, L. Jean
    HUMAN ASPECTS OF INFORMATION SECURITY AND ASSURANCE, HAISA 2021, 2021, 613 : 127 - 137
  • [3] To pass or not to pass: Privacy-preserving physical access control
    Garcia-Rodriguez, Jesus
    Krenn, Stephan
    Slamanig, Daniel
    COMPUTERS & SECURITY, 2024, 136
  • [4] IP-driven access-independent resource management in converged access networks
    Bauer, Markus
    Dekorsy, Armin
    Schefczik, Peter
    Soellner, Michael
    BELL LABS TECHNICAL JOURNAL, 2007, 12 (02) : 37 - 61
  • [5] Radio access control in wireless IP networks
    Phan-Van, V
    Glisic, S
    WIRELESS IP AND BUILDING THE MOBILE INTERNET, 2003, : 227 - 254
  • [6] Designing Reliable IP Networks with an Access/Edge/Core Hierarchical Structure
    Chamberland, Steven
    INFOR, 2009, 47 (02) : 117 - 131
  • [7] IP multimedia services improvements in the GSM/EDGE radio access network
    Sébire, B
    Bysted, T
    Pedersen, K
    57TH IEEE VEHICULAR TECHNOLOGY CONFERENCE, VTC 2003-SPRING, VOLS 1-4, PROCEEDINGS, 2003, : 403 - 407
  • [8] ISSUES OF RESOURCE ACCESS AND CONTROL - A COMMENT
    OKALI, C
    AFRICA, 1989, 59 (01): : 56 - 60
  • [9] Resource admission control in access networks
    Ooghe, Sven
    Van Ewijk, Adrianus
    Nagarajan, Ramesh
    BELL LABS TECHNICAL JOURNAL, 2008, 13 (01) : 87 - 104
  • [10] The building resource pass - a control instrument for effective resource protection in concrete construction
    Propach, Vanessa
    Mrzigod, Alexandra
    Weidner, Stefanie
    BETON- UND STAHLBETONBAU, 2023, 118 (05) : 353 - 360