IP easy-pass: Edge resource access control

被引:0
|
作者
Wang, HN [1 ]
Bose, A [1 ]
El-Gendy, M [1 ]
Shin, KG [1 ]
机构
[1] Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23187 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing real-time communication services to multimedia applications and subscription-based Internet access often requires sufficient network resources to be reserved for real-time traffic. However, the reserved network resource is susceptible to resource theft and abuse. Without a resource access control mechanism that can efficiently differentiate legitimate real-time traffic from attacking packets, the traffic conditioning and policing enforced at ISP (Internet Service Provider) edge routers cannot protect the reserved network resource from embezzlement. On the contrary, the traffic policing at edge routers aggravates their vulnerability to flooding attacks by blindly dropping packets. In this paper, we propose a fast and light-weighted IP network-edge resource access control mechanism, called IP Easy-pass, to prevent unauthorized access to reserved network resources at edge devices. We attach a unique pass to each legitimate real-time packet so that an ISP edge router can validate the legitimacy of an incoming IP packet very quickly and simply by checking its pass. We present the generation of Easy-pass, its embedding, and verification procedures. We implement the IP Easy-pass mechanism in the Linux kernel, analyze its effectiveness against packet forgery and resource embezzlement attempts. Finally, we measure the overhead incurred by Easy-pass.
引用
收藏
页码:2583 / 2593
页数:11
相关论文
共 50 条
  • [21] IP Resource Sharing Framework in a Dual-Mode UltraFlow Access Network
    Shen, Thomas Shun Rong
    Yin, Shuang
    Kazovsky, Leonid G.
    JOURNAL OF OPTICAL COMMUNICATIONS AND NETWORKING, 2015, 7 (05) : 401 - 411
  • [22] Resource control in Next Generation Access Networks
    Winkelman, J. E. W.
    Ooghe, S.
    Willems, F. W.
    JOURNAL OF THE INSTITUTE OF TELECOMMUNICATIONS PROFESSIONALS, 2008, 2 : 31 - 35
  • [23] Resource and Role Based Access Control Model
    Li, Xingdong
    Jin, Zhengping
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 548 - 554
  • [24] Access Control and the Resource Description Framework: A Survey
    Kirrane, Sabrina
    Mileo, Alessandra
    Decker, Stefan
    SEMANTIC WEB, 2017, 8 (02)
  • [25] IP QoS architecture and algorithms based on adaptive edge control
    Fan, XM
    Lin, C
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 198 - 202
  • [26] Multi-Access Edge Computing Resource Slice Allocation: A Review
    Bahramisirat, Faezeh
    Gregory, Mark A.
    Li, Shuo
    IEEE ACCESS, 2024, 12 : 188572 - 188589
  • [27] Multi-Clustering Access Control Based on Access Control Lists under Edge Computing
    Cui, Guangzhang
    Wang, Tuo
    Xu, Zenghui
    2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTER ENGINEERING (ICAICE 2020), 2020, : 268 - 275
  • [28] IGMPx: Port based Service Access Control for IP multicast
    Pillai, Prashant
    Hu, Yim-Fun
    2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 683 - 690
  • [29] An alternative access control architecture for IP over ATM networks
    Paul, O
    Laurent, M
    SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 36 - 50
  • [30] Admission Control in IP Multicast over Heterogeneous Access Networks
    Santos, Pedro
    Pinto, Antonio
    Ricardo, Manuel
    Almeida, Teresa
    Fontes, Francisco
    NGMAST 2008: SECOND INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES, AND TECHNOLOGIES, PROCEEDINGS, 2008, : 35 - +