IP easy-pass: Edge resource access control

被引:0
|
作者
Wang, HN [1 ]
Bose, A [1 ]
El-Gendy, M [1 ]
Shin, KG [1 ]
机构
[1] Coll William & Mary, Dept Comp Sci, Williamsburg, VA 23187 USA
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Providing real-time communication services to multimedia applications and subscription-based Internet access often requires sufficient network resources to be reserved for real-time traffic. However, the reserved network resource is susceptible to resource theft and abuse. Without a resource access control mechanism that can efficiently differentiate legitimate real-time traffic from attacking packets, the traffic conditioning and policing enforced at ISP (Internet Service Provider) edge routers cannot protect the reserved network resource from embezzlement. On the contrary, the traffic policing at edge routers aggravates their vulnerability to flooding attacks by blindly dropping packets. In this paper, we propose a fast and light-weighted IP network-edge resource access control mechanism, called IP Easy-pass, to prevent unauthorized access to reserved network resources at edge devices. We attach a unique pass to each legitimate real-time packet so that an ISP edge router can validate the legitimacy of an incoming IP packet very quickly and simply by checking its pass. We present the generation of Easy-pass, its embedding, and verification procedures. We implement the IP Easy-pass mechanism in the Linux kernel, analyze its effectiveness against packet forgery and resource embezzlement attempts. Finally, we measure the overhead incurred by Easy-pass.
引用
收藏
页码:2583 / 2593
页数:11
相关论文
共 50 条
  • [31] Virtual Edge Architecture with Optical Bandwidth Resource Control
    Misawa, Akira
    Mochizuki, Konomi
    Tsuchiya, Hideo
    Nakagawa, Masahiro
    Hattori, Kyoto
    Katayama, Masaru
    Kani, Jun-ichi
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2016, E99B (08) : 1805 - 1812
  • [32] Challenges of real-time IP support in GSM/EDGE Radio Access Network
    Turina, D
    PIMRC 2000: 11TH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2000, : 8 - 12
  • [33] An Access Control Model for easy management of patient privacy in ERR systems
    Sicuranza, Mario
    Esposito, Angelo
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 463 - 470
  • [34] Optimal Upstream Spectrum Resource Allocation on IP-over-EONs Access Links
    Shao, Junyi
    Sun, Weiqiang
    Hu, Weisheng
    2020 OPTICAL FIBER COMMUNICATIONS CONFERENCE AND EXPOSITION (OFC), 2020,
  • [35] Modeling Access Control Resource Based on Process Algebra
    Wang Lisong
    Qin Xiaolin
    Ding Qiulin
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (03): : 173 - 176
  • [36] Advanced Resource Management with Access Control for Multitenant Hadoop
    Won, Heesun
    Nguyen, Minh Chau
    Gil, Myeong-Seon
    Moon, Yang-Sae
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2015, 17 (06) : 592 - 601
  • [37] Resource hierarchies for role-based access control
    Wolf, A
    Von Hammel-Bonten, C
    Köhlmann, M
    Würfel, U
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL VI, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING I, 2002, : 195 - 200
  • [38] Adaptive Access Control and Resource Allocation for Random Access in NGSO Satellite Networks
    Jia, Haoge
    Jiang, Chunxiao
    Kuang, Linling
    Lu, Jianhua
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (04): : 2721 - 2733
  • [39] Cacheable decentralized groups for grid resource access control
    Hemmes, Jeffrey
    Thain, Douglas
    2006 7TH IEEE/ACM INTERNATIONAL CONFERENCE ON GRID COMPUTING, 2006, : 192 - +
  • [40] JXTA resource access control by means of advertisement encryption
    Arnedo-Moreno, Joan
    Herrera-Joancomarti, Jordi
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING-THEORY METHODS AND APPLICATIONS, 2010, 26 (01): : 21 - 28