TY - CONF
T1 - Stealth probing
T2 - 2006 USENIX Annual Technical Conference
AU - Avramopoulos, Ioannis
AU - Rexford, Jennifer
N1 - Funding Information:
The authors would like to thank Constantinos Dovro-lis, Nick Feamster, Karthik Lakshminarayanan, Barath Raghavan, Alex Snoeren, and the anonymous reviewers for their invaluable feedback. Ioannis Avramopou-los has been supported by a grant from the New Jersey Center for Wireless and Internet Security and a wireless testbed project (ORBIT) grant from the National Science Foundation. Jennifer Rexford was supported by Homeland Security Advanced Research Project Agency grant 1756303.
Publisher Copyright:
© 2006 USENIX Association. All rights reserved.
PY - 2006
Y1 - 2006
N2 - IP routing is notoriously vulnerable to accidental misconfiguration and malicious attack. Although secure routing protocols are an important defense, the data plane must be part of any complete solution. Existing proposals for secure (link-level) forwarding are heavy-weight, requiring cryptographic operations at each hop in a path. Instead, we propose a light-weight data-plane mechanism (called stealth probing) that monitors the availability of paths in a secure fashion, while enabling the management plane to home in on the location of adversaries by combining the results of probes from different vantage points (called Byzantine tomography). We illustrate how stealth probing and Byzantine tomography can be applied in today’s routing architecture, without requiring support from end hosts or internal routers.
AB - IP routing is notoriously vulnerable to accidental misconfiguration and malicious attack. Although secure routing protocols are an important defense, the data plane must be part of any complete solution. Existing proposals for secure (link-level) forwarding are heavy-weight, requiring cryptographic operations at each hop in a path. Instead, we propose a light-weight data-plane mechanism (called stealth probing) that monitors the availability of paths in a secure fashion, while enabling the management plane to home in on the location of adversaries by combining the results of probes from different vantage points (called Byzantine tomography). We illustrate how stealth probing and Byzantine tomography can be applied in today’s routing architecture, without requiring support from end hosts or internal routers.
UR - http://www.scopus.com/inward/record.url?scp=85077313871&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85077313871&partnerID=8YFLogxK
M3 - Paper
AN - SCOPUS:85077313871
SP - 267
EP - 272
Y2 - 30 May 2006 through 3 June 2006
ER -