Towards an Active Network Architecture – Critique Rejaie Johnson Gergely Biczok.

Slides:



Advertisements
Similar presentations
Nicholas Weaver International Computer Science Institute
Advertisements

The Role of a Registry Certificate Authority Some Steps towards Improving the Resiliency of the Internet Routing System: The Role of a Registry Certificate.
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Key Management. Shared Key Exchange Problem How do Alice and Bob exchange a shared secret? Offline – Doesnt scale Using public key cryptography (possible)
Computer System Organization Computer-system operation – One or more CPUs, device controllers connect through common bus providing access to shared memory.
NDN in Local Area Networks Junxiao Shi The University of Arizona
CTO Office Reliability & Security Distinctions and Interactions Hal Lockhart BEA Systems.
1 Improving the Performance of Distributed Applications Using Active Networks Mohamed M. Hefeeda 4/28/1999.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
CS 268: Active Networks Ion Stoica May 6, 2002 (* Based on David Wheterall presentation from SOSP ’99)
G Robert Grimm New York University Pulling Back: How to Go about Your Own System Project?
Tussle in cyberspace: Defining tomorrow ’ s internet D.Clark, J.Wroclawski, K.Sollins & R.Braden Presented by: Ao-Jan Su (Slides in courtesy of: Baoning.
1 Network Management Active Networks. 2 Network Management.
Enabling an Energy-Efficient Future Internet Through Selectively Connected End System Mark Allman Ken Christensen Bruce Nordman Vern Paxson.
CS-495 Advanced Networking David Choffnes, Spring 2005 Active Networks Introduction (What and Why) Active Network Design (How) Applications Experience.
G Robert Grimm New York University Pulling Back: How to Go about Your Own System Project?
Exokernel: An Operating System Architecture for Application-Level Resource Management Dawson R. Engler, M. Frans Kaashoek, and James O’Toole Jr. M.I.T.
Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access memory.
CMSC 414 Computer and Network Security Lecture 20 Jonathan Katz.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
CS 6401 Efficient Addressing Outline Addressing Subnetting Supernetting.
4 August 2005draft-burger-simple-imdn-011 Instant Message Delivery Notification (IMDN) for Presence and Instant Messaging (CPIM) Messages draft-burger-simple-imdn-01.
GETTING WEB READY Introduction to Web Hosting. Table of Contents + Websites: The face of your business …………………………………………………………………………1 + Get your website.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Secure Embedded Processing through Hardware-assisted Run-time Monitoring Zubin Kumar.
Chapter 3.1:Operating Systems Concepts 1. A Computer Model An operating system has to deal with the fact that a computer is made up of a CPU, random access.
What does it take to define an architecture? (Part 2) David D. Clark July, 2012.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Lecture 29 Page 1 Advanced Network Security Privacy in Networking Advanced Network Security Peter Reiher August, 2014.
Feb 20, 2001CSCI {4,6}900: Ubiquitous Computing1 Announcements.
Presented by Amlan B Dey.  Access control is the traditional center of gravity of computer security.  It is where security engineering meets computer.
Problem Determination Your mind is your most important tool!
Defense by Amit Saha March 25 th, 2004, Rice University ANTS : A Toolkit for Building and Dynamically Deploying Network Protocols David Wetherall, John.
CS470, A.SelcukThe Big Picture1 The Big Picture Practical, Economic, Legal Considerations CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin.
Privacy & Security Online Ivy, Kris & Neil Privacy Threat - Ivy Is Big Brother Watching You? - Kris Identity Theft - Kris Medical Privacy - Neil Children’s.
Proof Carrying Code Zhiwei Lin. Outline Proof-Carrying Code The Design and Implementation of a Certifying Compiler A Proof – Carrying Code Architecture.
Efficient Addressing Outline Addressing Subnetting Supernetting CS 640.
Tussle in Cyberspace: Defining Tomorrow’s Internet Offense by Ahamed Mohammed.
Tussle in cyberspace: Defining tomorrow’s internet D.Clark, J.Wroclawski, K.Sollins, R.Braden Presenter: Baoning Wu.
Security Issues in Control, Management and Routing Protocols M.Baltatu, A.Lioy, F.Maino, D.Mazzocchi Computer and Network Security Group Politecnico di.
ICOM 6115: Computer Systems Performance Measurement and Evaluation August 11, 2006.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Operating Systems Lecture 14 Segments Adapted from Operating Systems Lecture Notes, Copyright 1997 Martin C. Rinard. Zhiqing Liu School of Software Engineering.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Introduction to Active Network Technology Bernhard Plattner Computer Engineering and Networks Laboratory ETH Zurich, Switzerland.
Java Security Session 19. Java Security / 2 of 23 Objectives Discuss Java cryptography Explain the Java Security Model Discuss each of the components.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
CS223: Software Engineering Lecture 2: Introduction to Software Engineering.
Exploiting Instruction Streams To Prevent Intrusion Milena Milenkovic.
Lecture 4 Page 1 CS 111 Online Modularity and Memory Clearly, programs must have access to memory We need abstractions that give them the required access.
BGP Validation Russ White Rule11.us.
Installation and Setting up a Wireless LAN. Why would you want a Wireless LAN? Because it would take a lot of cable to set up your Internet, and a wireless.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Virtual Memory (Section 9.3). The Need For Virtual Memory Many computers don’t have enough memory in RAM to accommodate all the programs a user wants.
Hardware-rooted Trust for Secure Key Management & Transient Trust
DNS Security Advanced Network Security Peter Reiher August, 2014
Lesson 2-9 AP Computer Science Principles
ANTS Goals Today’s networks lack flexibility …
^ About the.
Modularity and Memory Clearly, programs must have access to memory
Distributed Content in the Network: A Backbone View
Open on the student drive
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
DNS Security The Domain Name Service (DNS) translates human-readable names to IP addresses E.g., thesiger.cs.ucla.edu translates to DNS.
CSE 542: Operating Systems
Presentation transcript:

Towards an Active Network Architecture – Critique Rejaie Johnson Gergely Biczok

Code Proposal talks about how we are able to execute code and routers Potential attacks on AS’s, etc. What will happen when code has bugs, runs for too long or the size of code is too big?

Code Safety, security, accountability/authentication: weak arguments given, What about non trusted and unworthy code? Third parties – will they be reliable?

Caching and Routing Routing caching will be an issue ANTS wants to use caching and load code at routers. Many routers already have their hands full. Do we have to put computer farms at every router to accommodate capsules?

Funding Funded – September August 2000 This is 2008 – What happened? Most of the people in the project don’t have working websites. Don’t care about your own project?

Other issues End-End encryption, which is stated Sharing State What about ISP changing to this? Will this be beneficial to them?

Program encoding 1. Source code Human readable and easy to write BUT interpreter is needed! Significant performance degradation Intermediate code Java-like Wonderful properties BUT resource-hogging! How much RAM is enough…

Program encoding 2. Platform-dependent code Efficient Fastest possible BUT do you really think that a “capsule” will carry 5-10 different realization of a program + the actual data??? 1K of data + 5*50K for the program -> much ado about nothing…

Interoperability “shared understanding” on resources and their names BW, CPU, RAM, Disk BUT what if new resources are emerging Traditional IP networking doesn’t have a problem with that!

Resource safety Authorization You have to validate all user requests BUT how? “we assume that cryptography will provide the basis for the validation mechanism” REALLY??? Overhead potentially on all capsules Generating new security problems in an already stressed environment Without solving any Automated delegation of authorization Even authors admit this is shaky ground

Closing IP hourglass -> agreed program encoding and computation environment “hourglass” Destroying the end-to-end principle No means for checking if I get the data that I asked for (forget about Network Neutrality) Interesting idea BUT Mostly questions without answers Detailed arguments are not convincing