Hardened networks: Incremental upgrading of the Internet for attack resilience

Shu Zhang, Partha Dasgupta

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Network security is conventionally implemented at the edge of the network (such as SSL, SSh), or router-based filtering. They require the awareness from the users and the understanding of the complicated configuration. They do little to provide resilience to network attacks. In this paper, we discuss a different approach to enhance of network security. We use smarter routers to build security mechanisms (source authentication, flow control, encryption) into the fabric of the network. It allows for incremental upgrading as well as compatibility with all current protocols. Since the security mechanisms are at the router level, there is no impact on the end user. We also show some implementation and simulation results.

Original languageEnglish (US)
Title of host publicationProceedings - 12th International Conference on Computer Communications and Networks, ICCCN 2003
EditorsRonald P. Luijten, E.K. Park, Luiz DaSilva
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages595-598
Number of pages4
ISBN (Electronic)0780379454
DOIs
StatePublished - Jan 1 2003
Event12th IEEE International Conference on Computer Communications and Networks, ICCCN 2003 - Dallas, United States
Duration: Oct 20 2003Oct 22 2003

Publication series

NameProceedings - International Conference on Computer Communications and Networks, ICCCN
Volume2003-January
ISSN (Print)1095-2055

Other

Other12th IEEE International Conference on Computer Communications and Networks, ICCCN 2003
CountryUnited States
CityDallas
Period10/20/0310/22/03

Keywords

  • Access protocols
  • Authentication
  • Cryptographic protocols
  • Cryptography
  • IP networks
  • Information filtering
  • Information security
  • Internet
  • Resilience
  • TCPIP

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Fingerprint Dive into the research topics of 'Hardened networks: Incremental upgrading of the Internet for attack resilience'. Together they form a unique fingerprint.

Cite this