8
The role of network capabilities Xiaowei Yang [email protected] UC Irvine NSF FIND PI meeting, June 28 2007

The role of network capabilities Xiaowei Yang [email protected] UC Irvine NSF FIND PI meeting, June 28 2007

Embed Size (px)

Citation preview

Page 1: The role of network capabilities Xiaowei Yang xwy@uci.edu UC Irvine NSF FIND PI meeting, June 28 2007

The role of network capabilities

Xiaowei [email protected]

UC Irvine

NSF FIND PI meeting, June 28 2007

Page 2: The role of network capabilities Xiaowei Yang xwy@uci.edu UC Irvine NSF FIND PI meeting, June 28 2007

Root cause of unwanted traffic

Any host can send to any destination without obtaining permissions

Page 3: The role of network capabilities Xiaowei Yang xwy@uci.edu UC Irvine NSF FIND PI meeting, June 28 2007

Network capabilities: ask-before-send

• [Anderson03], TVA, SIFF1. Source requests permission to send. 2. Destination authorizes source for a limited transfer,

e.g, 32KB in 10 secs• A capability is the proof of a destination’s

authorization.3. Source places capabilities on packets and sends

them.4. Network filters packets based on capabilities.

cap

Page 4: The role of network capabilities Xiaowei Yang xwy@uci.edu UC Irvine NSF FIND PI meeting, June 28 2007

But attackers can flood request packets !

Request packets do not carry capabilities

Page 5: The role of network capabilities Xiaowei Yang xwy@uci.edu UC Irvine NSF FIND PI meeting, June 28 2007

Protecting request channel is different

Request packets can be rate limited Protect established connections

cap capcap

Page 6: The role of network capabilities Xiaowei Yang xwy@uci.edu UC Irvine NSF FIND PI meeting, June 28 2007

Protecting request channel is different

Fair resource allocation to prevent attackers from overwhelming legitimate requests

Fair queuing, puzzles [Parno07]

Page 7: The role of network capabilities Xiaowei Yang xwy@uci.edu UC Irvine NSF FIND PI meeting, June 28 2007

Protecting request channel is different

Reliable filters close to attack sources Cryptographic secure identifiers

Page 8: The role of network capabilities Xiaowei Yang xwy@uci.edu UC Irvine NSF FIND PI meeting, June 28 2007

The role of capabilities

Allow comprehensive DoS protection mechanisms to be deployed on a slow channel

Enable traffic authorization

Protect existing connections during attack

cap