2006 USENIX Annual Technical Conference Abstract
Pp. 267272 of the Proceedings
Stealth Probing: Efficient Data-Plane Security for IP Routing
Ioannis Avramopoulos and Jennifer Rexford, Princeton University
Abstract
IP routing is notoriously vulnerable to accidental misconfiguration
and malicious attack. Although secure routing protocols are an
important defense, the data plane must be part of any complete
solution. Existing proposals for secure (link-level) forwarding are
heavy-weight, requiring cryptographic operations at each hop in a
path. Instead, we propose a light-weight data-plane
mechanism (called stealth probing) that monitors the
availability of paths in a secure fashion, while enabling the
management plane to home in on the location of adversaries by
combining the results of probes from different vantage points (called
Byzantine tomography). We illustrate how stealth probing and
Byzantine tomography can be applied in today's routing architecture,
without requiring support from end hosts or internal routers.
- View the full text of this paper in HTML and PDF. Listen to the presentation in MP3 format.
Until June 2007, you will need your USENIX membership identification in order to access the full papers. The Proceedings are published as a collective work, © 2006 by the USENIX Association. All Rights Reserved. Rights to individual papers remain with the author or the author's employer. Permission is granted for the noncommercial reproduction of the complete work for educational or research purposes. USENIX acknowledges all trademarks within this paper.
- If you need the latest Adobe Acrobat Reader, you can download it from Adobe's site.
|