skip to main content
10.1145/1402958.1402997acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

Accountable internet protocol (aip)

Published:17 August 2008Publication History

ABSTRACT

This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding entity. We discuss how AIP enables simple solutions to source spoofing, denial-of-service, route hijacking, and route forgery. We also discuss how AIP's design meets the challenges of scaling, key management, and traffic engineering.

References

  1. ITRS international technology roadmap for semiconductors, 2006.Google ScholarGoogle Scholar
  2. D. Andersen, H. Balakrishnan, N. Feamster, T. Koponen, D. Moon, and S. Shenker. Holding the Internet accountable. In Proc. 6th ACM Workshop on Hot Topics in Networks (Hotnets-VI), Nov. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. APNIC. The APNIC Resource Certification Page. http://mirin.apnic.net/resourcecerts/.Google ScholarGoogle Scholar
  4. K. Argyraki and D. R. Cheriton. Active Internet traffic filtering: Real-time response to denial-of-service attacks. In Proc. USENIX Annual Technical Conference, Apr. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. T. Aura. Cryptographically Generated Addresses (CGA). Internet Engineering Task Force, Mar. 2005. RFC 3972.Google ScholarGoogle ScholarCross RefCross Ref
  6. R. Beverly and S. Bauer. The Spoofer project: Inferring the extent of source address filtering on the Internet. In Proc. SRUTI Workshop, July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. CNET News.com. Router Glitch Cuts Net Access. http://news.com.com/2100-1033-279235.html, Apr. 1997.Google ScholarGoogle Scholar
  8. Z. Duan, X. Yuan, and J. Chandrashekar. Constructing Inter-Domain Packet Filters to Control IP Spoofing Based on BGP Updates. In Proc. IEEE INFOCOM, Mar. 2006.Google ScholarGoogle ScholarCross RefCross Ref
  9. D. Farinacci, V. Fuller, D. Oran, and D. Meyer. Locator/ID Separation Protocol (LISP). Internet Engineering Task Force, Apr. 2008. Internet Draft (http://tools.ietf.org/html/draft-farinacci-lisp-07). Work in progress, expires October 2008.Google ScholarGoogle Scholar
  10. P. Ferguson and D. Senie. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing. Internet Engineering Task Force, Jan. 1998. RFC 2267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. P. Ferguson and D. Senie. Network Ingress Filtering. Internet Engineering Task Force, May 2000. BCP 38, RFC 2827.Google ScholarGoogle Scholar
  12. V. Fuller. Scaling issues with routing+multihoming, Feb. 2007. Plenary session at APRICOT, the Asia Pacific Regional Internet Conference on Operational Technologies.Google ScholarGoogle Scholar
  13. G. Goodell, W. Aiello, T. Griffin, J. Ioannidis, P. McDaniel, and A. Rubin. Working around BGP: An incremental approach to improving security and accuracy in interdomain routing. In Proc. NDSS, Feb. 2003.Google ScholarGoogle Scholar
  14. G. Huston, G. Michaelson, and R. Loomans. A Profile for Resource Certificate Repository Structure. Internet Engineering Task Force, June 2006. http://mirin.apnic.net/resourcecerts/project-notes/draft-ietf-sidr-repos-struct-00.html.Google ScholarGoogle Scholar
  15. J. Karlin, S. Forrest, and J. Rexford. Pretty Good BGP: Protecting BGP by cautiously selecting routes. Technical report, University of New Mexico, Oct. 2005. TR-CS-2005-37.Google ScholarGoogle Scholar
  16. F. Kastenholz. ISLAY: A New Routing and Addressing Architecture. Internet Engineering Task Force, May 2002. http://ietfreport.isoc.org/idref/draft-irtf-routing-islay/.Google ScholarGoogle Scholar
  17. S. Kent and R. Atkinson. Security Architecture for the Internet Protocol. Internet Engineering Task Force, Nov. 1998. RFC 2401. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. Kent, C. Lynn, and K. Seo. Secure border gateway protocol (S-BGP). IEEE JSAC, 18 (4): 582--592, Apr. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. Killalea. Internet Service Provider Security Services and Procedures. Internet Engineering Task Force, Nov. 2000. RFC 3013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. D. Krioukov, kc claffy, K. Fall, and A. Brady. On Compact Routing for the Internet. ACM Computer Communications Review, 37 (3): 41--52, July 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Lad, D. Massey, D. Pei, Y. Wu, B. Zhang, and L. Zhang. AS: A prefix hijack alert system. In Proc. 15th USENIX Security Symposium, Aug. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Leskovec, J. Kleinberg, and C. Faloutsos. Graphs over time: Densification laws, shrinking diameters and possible explanations. In Proc. 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Aug. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Li, R. Bush, Z. M. Mao, T. Griffin, M. Roughan, D. Stutzbach, and E. Purpus. Watching data streams toward a multi-homed sink under routing changes introduced by a BGP beacon. In Passive & Active Measurement (PAM), Mar. 2006.Google ScholarGoogle Scholar
  24. X. Liu, X. Yang, D. Wetherall, and A. Li. Passport: Secure and Adoptable Source Authentication. In Proc. 5th USENIX NSDI, Apr. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating key management from file system security. In Proc. 17th ACM Symposium on Operating Systems Principles (SOSP), pages 124--139, Dec. 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. D. McCullagh. How Pakistan knocked YouTube offline. http://news.cnet.com/8301-10784_3-9878655-7.html, Feb. 2008.Google ScholarGoogle Scholar
  27. D. Meyer, L. Zhang, and K. Fall. Report from the IAB Workshop on Routing and Addressing. Internet Engineering Task Force, Sept. 2007. RFC 4984.Google ScholarGoogle ScholarCross RefCross Ref
  28. R. Moskowitz and P. Nikander. Host Identity Protocol (HIP) Architecture. Internet Engineering Task Force, May 2006. RFC 4423.Google ScholarGoogle ScholarCross RefCross Ref
  29. M. Ohta. 8+8 Addressing for IPv6 End to End Multihoming, Jan. 2004. draft-ohta-multi6-8plus8-00 (Expired IETF Draft).Google ScholarGoogle Scholar
  30. K. Park and H. Lee. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets. In Proc. ACM SIGCOMM, Aug. 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In Proc. ACM SIGCOMM, Aug. 2006. An earlier version appeared as Georgia Tech TR GT-CSS-2006-001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. In Proc. ACM SIGCOMM, Aug. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Renesys. Renesys Routing Intelligence. http://www.renesys.com/products_services/routing_intelligence.shtml.Google ScholarGoogle Scholar
  34. M. Shaw. Leveraging good intentions to reduce unwanted network traffic. In Proc. USENIX Steps to Reduce Unwanted Traffic on the Internet workshop, July 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. G. Siganos and M. Faloutsos. Analyzing BGP Policies: Methodology and Tool. In Proc. IEEE INFOCOM, Mar. 2004.Google ScholarGoogle ScholarCross RefCross Ref
  36. T. L. Simon. oof. panix sidelined by incompetence... again. http://merit.edu/mail.archives/nanog/2006-01/msg00483.html, Jan. 2006.Google ScholarGoogle Scholar
  37. A. C. Snoeren and H. Balakrishnan. An end-to-end approach to host mobility. In Proc. ACM Mobicom, pages 155--166, Aug. 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Spammer-X. Inside the SPAM Cartel. Syngress, 2004. Page 40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. G. Varghese. Network Algorithmics. Morgan Kaufmann, 2007.Google ScholarGoogle Scholar
  40. P. Verkaik, A. Broido, kc claffy, R. Gao, Y. Hyun, and R. van der Pol. Beyond CIDR aggregation. Technical Report TR-2004-01, CAIDA, Feb. 2004.Google ScholarGoogle Scholar
  41. Q. Vohra and E. Chen. BGP Support for Four-octet AS Number Space. Internet Engineering Task Force, May 2007. RFC 4893.Google ScholarGoogle ScholarCross RefCross Ref
  42. M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker. Middleboxes no longer considered harmful. In Proc. 6th USENIX OSDI, Dec. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. R. White. Securing BGP through secure origin BGP. The Internet Protocol Journal, 6 (3), Sept. 2003. http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_6-3/ipj_6-3.pdf.Google ScholarGoogle Scholar
  44. Q. Wu, Y. Liao, T. Wolf, and L. Gao. Benchmarking BGP routers. In Proc. IEEE International Symposium on Workload Characterization (IISWC), Sept. 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. X. Zhang, P. Francis, J. Wang, and K. Yoshida. Scaling IP routing with the core router-integrated overlay. In IEEE International Conference on Network Protocols (ICNP), Nov. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Accountable internet protocol (aip)

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SIGCOMM '08: Proceedings of the ACM SIGCOMM 2008 conference on Data communication
          August 2008
          452 pages
          ISBN:9781605581750
          DOI:10.1145/1402958
          • cover image ACM SIGCOMM Computer Communication Review
            ACM SIGCOMM Computer Communication Review  Volume 38, Issue 4
            October 2008
            436 pages
            ISSN:0146-4833
            DOI:10.1145/1402946
            Issue’s Table of Contents

          Copyright © 2008 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 17 August 2008

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate554of3,547submissions,16%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader