Skip to main content

Using SCTP to Implement Multihomed Web Servers

  • Conference paper
Databases in Networked Information Systems (DNIS 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 4777))

Included in the following conference series:

  • 481 Accesses

Abstract

Stream Control Transmission Protocol (SCTP) is an emerging transport protocol for sending data from one point to another over the Internet. SCTP provides innovative features beyond TCP, such as multihoming and multistreaming in a single SCTP association. With the explosive growth of Internet users, it remains an unsecured environment; hence the data protection from the malicious interception becomes a crucial issue. In this paper, we present how the multihoming feature of SCTP can be exploited to implement a multihomed web client and server for providing resilience to network failure and a certain level of data protection against the malicious interception as well as achieving high throughput by utilizing the multiple paths that exist between the multihomed web client and server. We discuss the potential threats during data transmission and the way of defense using multihoming in this aspect.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Lu, W.P., et al.: Secure Communication in Internet Environments: A Hierarchical Key Management Scheme for End-to-End Encryption. IEEE Trans. Comm. 37(10), 1014–1023 (1989)

    Article  Google Scholar 

  2. Pierson, L.G., et al.: Key Management for Large Scale End-to-End Encryption. In: 28th Annual International Carnahan Conference on Security Technology, pp. 76–79. IEEE Computer Society Press, New York (October 1994)

    Google Scholar 

  3. Spanos, G.A., et al.: Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. In: 4th International Conference on Computer Communications and Networks, pp. 2–10 (September 1995)

    Google Scholar 

  4. Van Droogenbroeck, M., et al.: Techniques for a selective encryption of uncompressed and compressed images. In: Advanced Concepts for Intelligent Vision Systems (ACIVS) 2002, Ghent, Belgium, pp. 90–97 (September 2002)

    Google Scholar 

  5. Van Droogenbroeck, M.: Partial encryption of images for real-time applications. In: Fourth IEEE Signal Processing Symposium, Hilvarenbeek, The Netherlands, pp. 11–15 ( April 2004)

    Google Scholar 

  6. Podesser, M., et al.: Selective bitplane encryption for secure transmission of image data in mobile environments. In: NORSIG 2002. 5th IEEE Nordic Signal Processing Symposium, Norway (October 2002)

    Google Scholar 

  7. Jungmaier, A., et al.: Performance evaluation of the Stream Control Transmission Protocol. In: High Performance Switching and Routing, Germany, pp. 141–148 (June 2000)

    Google Scholar 

  8. Ravier, T., et al.: Experimental studies of SCTP multi-homing. In: First Joint IEI/IEE Symposium on Telecommunications Systems Research, Dublin, Ireland (November 2001)

    Google Scholar 

  9. Islam, M., et al.: Throughput Analysis of SCTP over a Multi-homed Association. In: CIT 2006. Sixth IEEE International Conference on Computer and Information Technology, Seoul, Korea (September 2006)

    Google Scholar 

  10. Fu, S., et al.: Performance Modeling of SCTP Multihoming. IEEE Computer Society Press, St. Louis, MO (2005)

    Google Scholar 

  11. Wei, G., et al.: simulation on NS. IEEE ICII 2001 2, 345–350 (2001)

    Google Scholar 

  12. Kashihara, S., et al.: Multi-path Transmission Algorithm for End-to-End Seamless Handover across Heterogeneous Wireless Access Networks. IEICE Transaction on Communication E87-B(3), 490–496 (2004)

    Google Scholar 

  13. Coene, L.: Stream Control Transmission Protocol Applicability Statement. RFC 3257, IETF (April 2002)

    Google Scholar 

  14. Postel, J.: Transmission Control Protocol. RFC 793, IETF (September 1981)

    Google Scholar 

  15. Caro Jr., A.L., et al.: SCTP: A Proposed Standard for Robust Internet Data Transport. IEEE Computer 36(11), 56–63 (2003)

    Google Scholar 

  16. Schuba, C., et al.: Analysis of a denial of service attack on TCP. In: IEEE Symposium on Security and Privacy, pp. 208-223 (May 1997)

    Google Scholar 

  17. Stewart, R., et al.: Stream Control Transmission Protocol. RFC 2960, IETF (October 2000)

    Google Scholar 

  18. User Level Implementation of SCTP by University of Essen, http://www.sctp.de/sctp-download.html

  19. Computer Emergency Response Team.: Ongoing Network Monitoring Attacks. CERT Advisory CA-94:01 (February 1994)

    Google Scholar 

  20. tcpdump, http://www.tcpdump.org

  21. ethereal, http://www.ethereal.com

  22. Snort, http://www.snort.org

  23. Braden, R., et al.: Requirements for Internet hosts communication layers. RFC 1122, IETF (October 1989)

    Google Scholar 

  24. Jungmaier, A., et al.: On the use of SCTP in failover-scenarios. SCI 2002, USA, pp. 363-368 (July 2002)

    Google Scholar 

  25. Rosen, E., et al.: Multiprotocol label switching architecture. RFC 3031, IETF (January 2001)

    Google Scholar 

  26. Goldschlag, D., et al.: Hiding Routing Information. In: Anderson, R. (ed.) Information Hiding. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)

    Google Scholar 

  27. Reed, M., et al.: Anonymous Connections and Onion Routing. IEEE Journal on Selected Areas in Communications 16(4), 482–494 (1998)

    Article  Google Scholar 

  28. Goldschlag, D., et al.: Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM 42(2), 39–41 (1999)

    Article  Google Scholar 

  29. Wikipedia. http://en.wikipedia.org

  30. Li, Z., et al.: A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks. In: ICPPW 2005. International Conference on Parallel Processing Workshops, pp. 372–379 (June 2005)

    Google Scholar 

  31. Bouam, S., et al.: Data Security in Ad Hoc Networks Using MultiPath Routing. In: 14th IEEE Personal, Indoor and Mobile Radio Communications (September 2003)

    Google Scholar 

  32. Papadimitratos, P., et al.: Secure Data Transmission in Mobile Ad Hoc Networks. In: WiSe 2003, ACM Press, New York (September 2003)

    Google Scholar 

  33. Lou, W., et al.: SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks. In: IEEE INFOCOM 2004 (March 2004)

    Google Scholar 

  34. Burmester, M., et al.: Secure Multipath Communication in Mobile Ad hoc Networks. In: ITCC 2004. International Conference on Information Technology: Coding and Computing, vol. 2, p. 405 (April 2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Subhash Bhalla

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Islam, M.N., Kara, A. (2007). Using SCTP to Implement Multihomed Web Servers. In: Bhalla, S. (eds) Databases in Networked Information Systems. DNIS 2007. Lecture Notes in Computer Science, vol 4777. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75512-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75512-8_14

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75511-1

  • Online ISBN: 978-3-540-75512-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics