Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
An end-to-end approach to host mobility
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Graphs over time: densification laws, shrinking diameters and possible explanations
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Understanding the network-level behavior of spammers
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Active internet traffic filtering: real-time response to denial-of-service attacks
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
Middleboxes no longer considered harmful
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
The spoofer project: inferring the extent of source address filtering on the internet
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
Leveraging good intentions to reduce unwanted network traffic
SRUTI'06 Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet - Volume 2
PHAS: a prefix hijack alert system
USENIX-SS'06 Proceedings of the 15th conference on USENIX Security Symposium - Volume 15
On compact routing for the internet
ACM SIGCOMM Computer Communication Review
Scaling IP Routing with the Core Router-Integrated Overlay
ICNP '06 Proceedings of the Proceedings of the 2006 IEEE International Conference on Network Protocols
Passport: secure and adoptable source authentication
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Inside the spam cartel
IISWC '07 Proceedings of the 2007 IEEE 10th International Symposium on Workload Characterization
Secure Border Gateway Protocol (S-BGP)
IEEE Journal on Selected Areas in Communications
Revisiting Route Caching: The World Should Be Flat
PAM '09 Proceedings of the 10th International Conference on Passive and Active Network Measurement
Towards a new generation of information-oriented internetworking architectures
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
NetReview: detecting when interdomain routing goes wrong
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
De-anonymizing the internet using unreliable IDs
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers
Proceedings of the ACM SIGCOMM 2009 conference on Data communication
Building a fast, virtualized data plane with programmable hardware
Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures
Hash, don't cache: fast packet forwarding for enterprise edge routers
Proceedings of the 1st ACM workshop on Research on enterprise networking
BUFFALO: bloom filter forwarding architecture for large organizations
Proceedings of the 5th international conference on Emerging networking experiments and technologies
Building a fast, virtualized data plane with programmable hardware
ACM SIGCOMM Computer Communication Review
Towards a theory of accountability and audit
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
SwitchBlade: a platform for rapid deployment of network protocols on programmable hardware
Proceedings of the ACM SIGCOMM 2010 conference
NetFence: preventing internet denial of service from inside out
Proceedings of the ACM SIGCOMM 2010 conference
Pretty good packet authentication
HotDep'08 Proceedings of the Fourth conference on Hot topics in system dependability
Don't love thy nearest neighbor
IPTPS'10 Proceedings of the 9th international conference on Peer-to-peer systems
HTTP as the narrow waist of the future internet
Hotnets-IX Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
CloudPolice: taking access control out of the network
Hotnets-IX Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
YAMR: yet another multipath routing protocol
ACM SIGCOMM Computer Communication Review
An Internet without the Internet protocol
Computer Networks: The International Journal of Computer and Telecommunications Networking
Scalable routing on flat names
Proceedings of the 6th International COnference
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Better by a HAIR: hardware-amenable Internet routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Decoupling the design of identifier-to-locator mapping services from identifiers
Computer Networks: The International Journal of Computer and Telecommunications Networking
Bootstrapping accountability in the internet we have
Proceedings of the 8th USENIX conference on Networked systems design and implementation
Security design for an inter-domain publish/subscribe architecture
The future internet
ACM SIGCOMM Computer Communication Review
NetQuery: a knowledge plane for reasoning about network properties
Proceedings of the ACM SIGCOMM 2011 conference
Efficient defence against misbehaving TCP receiver DoS attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Access path based source address validation in mobile IPv6
NPC'11 Proceedings of the 8th IFIP international conference on Network and parallel computing
XIA: an architecture for an evolvable and trustworthy internet
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
Intelligent design enables architectural evolution
Proceedings of the 10th ACM Workshop on Hot Topics in Networks
Towards a formal model of accountability
Proceedings of the 2011 workshop on New security paradigms workshop
ASAP: a low-latency transport layer
Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies
Verifying and enforcing network paths with icing
Proceedings of the Seventh COnference on emerging Networking EXperiments and Technologies
MobilityFirst future internet architecture project
AINTEC '11 Proceedings of the 7th Asian Internet Engineering Conference
Virtual network embedding through topology awareness and optimization
Computer Networks: The International Journal of Computer and Telecommunications Networking
XIA: efficient support for evolvable internetworking
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Multi-layer security analysis and experimentation of high speed protocol data transfer for GRID
International Journal of Grid and Utility Computing
Provable security of S-BGP and other path vector protocols: model, analysis and extensions
Proceedings of the 2012 ACM conference on Computer and communications security
Using trustworthy host-based information in the network
Proceedings of the seventh ACM workshop on Scalable trusted computing
Software-defined internet architecture: decoupling architecture from infrastructure
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
MobilityFirst: a robust and trustworthy mobility-centric architecture for the future internet
ACM SIGMOBILE Mobile Computing and Communications Review
Architecting for edge diversity: supporting rich services over an unbundled transport
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Estimating the number of hosts corresponding to an address while preserving anonymity
NSS'12 Proceedings of the 6th international conference on Network and System Security
Embassies: radically refactoring the web
nsdi'13 Proceedings of the 10th USENIX conference on Networked Systems Design and Implementation
Protecting access privacy of cached contents in information centric networks
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Network service abstractions for a mobility-centric future internet architecture
Proceedings of the eighth ACM international workshop on Mobility in the evolving internet architecture
Safeguarding ad hoc networks with a self-organized membership control system
Computer Networks: The International Journal of Computer and Telecommunications Networking
Scalable, high performance ethernet forwarding with CuckooSwitch
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
CoDef: collaborative defense against large-scale link-flooding attacks
Proceedings of the ninth ACM conference on Emerging networking experiments and technologies
Application-layer design patterns for accountable-anonymous online identities
Telecommunications Policy
Computer Networks: The International Journal of Computer and Telecommunications Networking
Journal of Network and Computer Applications
Estimating the number of hosts corresponding to an intrusion alert while preserving privacy
Journal of Computer and System Sciences
Hi-index | 0.00 |
This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding entity. We discuss how AIP enables simple solutions to source spoofing, denial-of-service, route hijacking, and route forgery. We also discuss how AIP's design meets the challenges of scaling, key management, and traffic engineering.