Skip to main content

Security in Programmable Network Infrastructures: The Integration of Network and Application Solutions

  • Conference paper
  • First Online:
Active Networks (IWAN 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1942))

Included in the following conference series:

Abstract

Programming the network infrastructure significantly enhances its flexibility and favors fast deployment of new protocols, but also introduces serious security risks. It is crucial to protect the whole distributed infrastructure, especially its availability in case of denial-of-service attacks. A security framework for programmable networks may provide security solutions at different levels of abstraction. Active networks mainly propose a network-layer approach, by extending the packet format to include security information. Mobile code technologies tend to provide security tools at the application layer to integrate with standard external infrastructures, such as public key ones. The paper describes the security frameworks of several programmable network proposals and points out the dis/advantages related to the adopted abstraction level. This comparison suggests to consider an integrated security framework capable of choosing the service-specific balance between application-layer flexibility and network efficiency. To this purpose, the paper presents the architecture of a Programmable Network Component (PNC) that integrates security solutions at different layers and that has been implemented by using a mobile agent programming environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aaron, R., Skillen, R. (eds.): Special Section on Electronic Commerce. IEEE Communications Magazine 37(9), 1999

    Google Scholar 

  2. Psounis, K.: Active Networks: Applications, Security, Safety, and Architectures. IEEE Communications Surveys. http://www.comsoc.org/pubs/surveys (1999)

  3. Covaci, S. (ed.): Proc. 1st Int. Working Conference on Active Networks (IWAN.99). Lecture Notes on Computer Science, Vol. 1653. Springer-Verlag, Berlin Heidelberg New York (1999)

    Google Scholar 

  4. Amir, E., McCanne, S., Katz, R.: An Active Service Framework and its Application to Real-time Multimedia Transcoding. Computer Communication Review 28(4), 1998

    Google Scholar 

  5. Alexander, D. S., et al.: Active Network Encapsulation Protocol (ANEP). RFC draft (1997)

    Google Scholar 

  6. Oppliger, R.: Security at the Internet Layer. IEEE Computer Magazine 31(9), 1998

    Google Scholar 

  7. Bellavista, P., Corradi, A., Stefanelli, C.: Protection and Interoperability for Mobile Agents: A Secure and Open Programming Environment. IEICE Transactions on Communications, IEICE/IEEE Special Issue on Autonomous Decentralized Systems E83-B(5), 2000

    Google Scholar 

  8. Schneier, B.: Cryptographic Design Vulnerabilities. IEEE Computer Magazine 31(9), 1998

    Google Scholar 

  9. Ford, W., Baum, M. S.: Secure Electronic Commerce — Building the Infrastructure for Digital Signatures and Encryption. Prentice Hall (1997)

    Google Scholar 

  10. Blaze, M., et al.: The Role of Trust Management in Distributed Systems Security. Secure Internet Programming: Issues in Distributed and Mobile Object Systems. Lecture Notes on Computer Science. Springer-Verlag, Berlin Heidelberg New York (1999)

    Google Scholar 

  11. Wang, P. Y., Yemini, Y., Florissi, D., Zinky, J.: A Distributed Resource Controller for QoS Applications. IEEE/IFIP Network Operations and Management Symposium (2000)

    Google Scholar 

  12. Alexander, D. S., et al.: A Secure Active Network Environment Architecture: Realization in SwitchWare. IEEE Network Magazine 12(3), 1998

    Google Scholar 

  13. Schwartz, B., et al.: Smart Packets for Active Networks. 2nd IEEE Conference on Open Architectures and Network Programming (1999)

    Google Scholar 

  14. Gong, L.: Inside Java 2 Platform Security: Architecture, API Design, and Implementation. Addison-Wesley (1999)

    Google Scholar 

  15. Raz, D., Shavitt, Y.: Active Networks for Efficient Distributed Network Management. IEEE Communications Magazine 38(3), 2000

    Google Scholar 

  16. Putzolu, D., Bakshi, S., Yadav, S., Yavatkar, R.: The Phoenix Framework: A Practical Architecture for Programmable Networks. IEEE Communications Magazine 38(3), 2000

    Google Scholar 

  17. Entrust, Entrust Technologies Inc. — http://developer.entrust.com/

  18. Damianou, N., et al.: Ponder: A Language for specifying Security and Management Policies for Distributed Systems, V 2.0. Imperial College Research Report DoC, 2000

    Google Scholar 

  19. Gordon, R.: Essential Java Native Interface. Prentice Hall (1998)

    Google Scholar 

  20. Sun Microsystems — Java Virtual Machine Profiler Interface (JVMPI), http://java.sun.com/ products/jdk/1.3/docs/guide/jvmpi/jvmpi.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Bellavista, P., Corradi, A., Montanari, R., Stefanelli, C. (2000). Security in Programmable Network Infrastructures: The Integration of Network and Application Solutions. In: Yasuda, H. (eds) Active Networks. IWAN 2000. Lecture Notes in Computer Science, vol 1942. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-40057-5_20

Download citation

  • DOI: https://doi.org/10.1007/3-540-40057-5_20

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-41179-6

  • Online ISBN: 978-3-540-40057-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics