Abstract
Todays networks are awash in illegitimate traffic: port scans, propagating worms, and illegal peer-to-peer transfers of materials [8]. This “noise” has created such a crescendo that legitimate traffic is starved for network resources. Essential network services, like DNS and remote file systems, are rendered unavailable. The challenge is no longer “quality of service” but rather “any service at all”. Techniques must be developed to identify and segregate traffic into good, bad, and suspicious classes. Quality of Service should now protect the good, block the bad, and slow the ugly when the network is under stress of high resource utilization. We discuss the research challenges and outline a possible architectural approach: COPS (Checking, Observing, and Protecting Services). It is founded on “Inspection-and-Action Boxes” (iBoxes) and packet annotations. The former are middlebox network elements able to inspect packets deeply while performing filtering, shaping, and labelling actions upon them. The latter is a new layer between routing and transport that tags packets for control purposes while also providing an in-band control plane for managing iBoxes across a network.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
RFC 2998 A Framework for Integrated Services Operation over Diffserv Networks
Personal Communication. Berkeley IS&T Staff (August 2004)
Personal Communication. Berkeley EECS Network Administrators (February 2005)
Fox, A., Patterson, D.: Self-repairing computers. In: Scientific American (June 2003)
Galis, A., Denazis, S., Brou, C., Klein, C. (eds.): Programmable Networks for IP Service Deployment. Artech House Publishers, London (2004)
Kohler, E., Morris, R., Chen, B., Jannotti, J., Kaashoek, M.F.: The click modular router. In: ACM Transactions on Computer Systems, November 2000, vol. 18 (2000)
Pang, R., Yegneswaran, V., Barford, P., Paxson, V., Peterson, L.: Characteristics of internet background radiation. In: ACM Internet Measurement Conference, Taormina, Sicily (October 2004)
Stemm, M., Seshan, S., Katz, R.H.: A network measurement architecture for adaptive applications. In: IEEE Infocomm 2000 Conference, Tel Aviv, Israel (March 2000)
Stoica, I., Zhang, H., Shenker, S.: Self-verifying CSFQ. In: Proceedings of INFOCOM 2002, New York, June 2002, pp. 21–30 (2002)
Subramanian, L., Roth, V., Stoica, I., Katz, R.H., Shenker, S.: Listen and whisper: Security mechanisms for BGP. In: USENIX/ACM Symposium on Networked System Design and Implementation (NSDI 2004), San Francisco, CA (March 2004)
Tennenhouse, D.L., Wetherall, D.J.: Towards an active network architecture. In: Computer Communications Review, April 1996, vol. 26 (1996)
Tsai, M.: The Design and Implementation of RouterVM. PhD thesis, U. C. Berkeley (Expected) (August 2005)
Zheng, A.X., Jordan, M.I., Liblit, B., Aiken, A.: Statistical debugging of sampled programs. In: Advances in Neural Information Processing Systems, NIPS (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Katz, R., Porter, G., Shenker, S., Stoica, I., Tsai, M. (2005). COPS: Quality of Service vs. Any Service at All. In: de Meer, H., Bhatti, N. (eds) Quality of Service – IWQoS 2005. IWQoS 2005. Lecture Notes in Computer Science, vol 3552. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11499169_1
Download citation
DOI: https://doi.org/10.1007/11499169_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26294-7
Online ISBN: 978-3-540-31659-6
eBook Packages: Computer ScienceComputer Science (R0)