Title :
IP easy-pass: edge resource access control
Author :
Wang, Haining ; Bose, Abhijit ; El-Gendy, Mohamed ; Shin, Kang G.
Author_Institution :
Dept. of Comput. Sci., Coll. of William & Mary, Williamsburg, VA, USA
Abstract :
Providing real-time communication services to multimedia applications and subscription-based Internet access often requires sufficient network resources to be reserved for real-time traffic. However, the reserved network resource is susceptible to resource theft and abuse. Without a resource access control mechanism that can efficiently differentiate legitimate real-time traffic from attacking packets, the traffic conditioning and policing enforced at ISP (Internet service provider) edge routers cannot protect the reserved network resource from embezzlement. On the contrary, the traffic policing at edge routers aggravates their vulnerability to flooding attacks by blindly dropping packets. We propose a fast and light-weighted IP network-edge resource access control mechanism, called IP easy-pass to prevent unauthorized access to reserved network resources at edge devices. We attach a unique pass to each legitimate real-time packet so that an ISP edge router can validate the legitimacy of an incoming IP packet very quickly and simply by checking its pass. We present the generation of easy-pass, its embedding, and verification procedures. We implement the IP easy-pass mechanism in the Linux kernel, analyze its effectiveness against packet forgery and resource embezzlement attempts. Finally, we measure the overhead incurred by easy-pass.
Keywords :
IP networks; Internet; Linux; authorisation; multimedia communication; real-time systems; subscriber loops; telecommunication network routing; telecommunication security; telecommunication services; telecommunication traffic; IP easy-pass; IP network; Internet service provider; Linux kernel; edge resource access control; edge router; multimedia application; packet forgery; real-time communication service; real-time traffic; resource embezzlement; subscription-based Internet access; verification procedures; Access control; Communication system traffic control; Floods; Forgery; IP networks; Kernel; Linux; Multimedia communication; Protection; Web and internet services;
Conference_Titel :
INFOCOM 2004. Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies
Print_ISBN :
0-7803-8355-9
DOI :
10.1109/INFCOM.2004.1354678