Abstract
Stream Control Transmission Protocol (SCTP) is an emerging transport protocol for sending data from one point to another over the Internet. SCTP provides innovative features beyond TCP, such as multihoming and multistreaming in a single SCTP association. With the explosive growth of Internet users, it remains an unsecured environment; hence the data protection from the malicious interception becomes a crucial issue. In this paper, we present how the multihoming feature of SCTP can be exploited to implement a multihomed web client and server for providing resilience to network failure and a certain level of data protection against the malicious interception as well as achieving high throughput by utilizing the multiple paths that exist between the multihomed web client and server. We discuss the potential threats during data transmission and the way of defense using multihoming in this aspect.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Lu, W.P., et al.: Secure Communication in Internet Environments: A Hierarchical Key Management Scheme for End-to-End Encryption. IEEE Trans. Comm. 37(10), 1014–1023 (1989)
Pierson, L.G., et al.: Key Management for Large Scale End-to-End Encryption. In: 28th Annual International Carnahan Conference on Security Technology, pp. 76–79. IEEE Computer Society Press, New York (October 1994)
Spanos, G.A., et al.: Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. In: 4th International Conference on Computer Communications and Networks, pp. 2–10 (September 1995)
Van Droogenbroeck, M., et al.: Techniques for a selective encryption of uncompressed and compressed images. In: Advanced Concepts for Intelligent Vision Systems (ACIVS) 2002, Ghent, Belgium, pp. 90–97 (September 2002)
Van Droogenbroeck, M.: Partial encryption of images for real-time applications. In: Fourth IEEE Signal Processing Symposium, Hilvarenbeek, The Netherlands, pp. 11–15 ( April 2004)
Podesser, M., et al.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: NORSIG 2002. 5th IEEE Nordic Signal Processing Symposium, Norway (October 2002)
Jungmaier, A., et al.: Performance evaluation of the Stream Control Transmission Protocol. In: High Performance Switching and Routing, Germany, pp. 141–148 (June 2000)
Ravier, T., et al.: Experimental studies of SCTP multi-homing. In: First Joint IEI/IEE Symposium on Telecommunications Systems Research, Dublin, Ireland (November 2001)
Islam, M., et al.: Throughput Analysis of SCTP over a Multi-homed Association. In: CIT 2006. Sixth IEEE International Conference on Computer and Information Technology, Seoul, Korea (September 2006)
Fu, S., et al.: Performance Modeling of SCTP Multihoming. IEEE Computer Society Press, St. Louis, MO (2005)
Wei, G., et al.: simulation on NS. IEEE ICII 2001 2, 345–350 (2001)
Kashihara, S., et al.: Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks. IEICE Transaction on Communication E87-B(3), 490–496 (2004)
Coene, L.: Stream Control Transmission Protocol Applicability Statement. RFC 3257, IETF (April 2002)
Postel, J.: Transmission Control Protocol. RFC 793, IETF (September 1981)
Caro Jr., A.L., et al.: SCTP: A Proposed Standard for Robust Internet Data Transport. IEEE Computer 36(11), 56–63 (2003)
Schuba, C., et al.: Analysis of a denial of service attack on TCP. In: IEEE Symposium on Security and Privacy, pp. 208-223 (May 1997)
Stewart, R., et al.: Stream Control Transmission Protocol. RFC 2960, IETF (October 2000)
User Level Implementation of SCTP by University of Essen, http://www.sctp.de/sctp-download.html
Computer Emergency Response Team.: Ongoing Network Monitoring Attacks. CERT Advisory CA-94:01 (February 1994)
tcpdump, http://www.tcpdump.org
ethereal, http://www.ethereal.com
Snort, http://www.snort.org
Braden, R., et al.: Requirements for Internet hosts communication layers. RFC 1122, IETF (October 1989)
Jungmaier, A., et al.: On the use of SCTP in failover-scenarios. SCI 2002, USA, pp. 363-368 (July 2002)
Rosen, E., et al.: Multiprotocol label switching architecture. RFC 3031, IETF (January 2001)
Goldschlag, D., et al.: Hiding Routing Information. In: Anderson, R. (ed.) Information Hiding. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)
Reed, M., et al.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communications 16(4), 482–494 (1998)
Goldschlag, D., et al.: Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM 42(2), 39–41 (1999)
Wikipedia. http://en.wikipedia.org
Li, Z., et al.: A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks. In: ICPPW 2005. International Conference on Parallel Processing Workshops, pp. 372–379 (June 2005)
Bouam, S., et al.: Data Security in Ad Hoc Networks Using MultiPath Routing. In: 14th IEEE Personal, Indoor and Mobile Radio Communications (September 2003)
Papadimitratos, P., et al.: Secure Data Transmission in Mobile Ad Hoc Networks. In: WiSe 2003, ACM Press, New York (September 2003)
Lou, W., et al.: SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks. In: IEEE INFOCOM 2004 (March 2004)
Burmester, M., et al.: Secure Multipath Communication in Mobile Ad hoc Networks. In: ITCC 2004. International Conference on Information Technology: Coding and Computing, vol. 2, p. 405 (April 2004)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Islam, M.N., Kara, A. (2007). Using SCTP to Implement Multihomed Web Servers. In: Bhalla, S. (eds) Databases in Networked Information Systems. DNIS 2007. Lecture Notes in Computer Science, vol 4777. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75512-8_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-75512-8_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-75511-1
Online ISBN: 978-3-540-75512-8
eBook Packages: Computer ScienceComputer Science (R0)