Assessing the Security of a Clean-Slate Internet Architecture
Data(s) |
20/10/2011
20/10/2011
22/06/2009
|
---|---|
Resumo |
The TCP/IP architecture was originally designed without taking security measures into consideration. Over the years, it has been subjected to many attacks, which has led to many patches to counter them. Our investigations into the fundamental principles of networking have shown that carefully following an abstract model of Interprocess Communication (IPC) addresses many problems [1]. Guided by this IPC principle, we designed a clean-slate Recursive INternet Architecture (RINA) [2]. In this paper, we show how, without the aid of cryptographic techniques, the bare-bones architecture of RINA can resist most of the security attacks faced by TCP/IP. We also show how hard it is for an intruder to compromise RINA. Then, we show how RINA inherently supports security policies in a more manageable, on-demand basis, in contrast to the rigid, piecemeal approach of TCP/IP. National Science Foundation (CISE/CCF 0820138, CISE/CSR 0720604, CISE/CNS 0524477, CNS/ITR 0205294,CISE/EIA RI 0202067) |
Identificador |
Boddapati, Gowtham; Day, John; Matta, Ibrahim; Chitkushev, Lou. "Assessing the Security of a Clean-Slate Internet Architecture", Technical Report BUCS-TR-2009-021, Computer Science Department, Boston University, June 22, 2009. [Available from: http://hdl.handle.net/2144/1745] |
Idioma(s) |
en_US |
Publicador |
Boston University Computer Science Department |
Relação |
BUCS Technical Reports;BUCS-TR-2009-021 |
Tipo |
Technical Report |