Skip to main content

An approach for measuring IP security performance in a distributed environment

  • Conference paper
  • First Online:
Parallel and Distributed Processing (IPPS 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1586))

Included in the following conference series:

Abstract

The Navy needs to use Multi Level Security (MLS) techniques in an environment with increasing amount of real time computation brough about by increased automation requirements and new more complex operations. NSWC-DD has initiated testing of a security protocol based on the commercial standard, IPSEC, which is becoming available in Commercial Off The Shelf (COTS) computing products. IPSEC is viewed as a critical component towards providing MLS capabilities. Current implementations of IPSEC are implemented in software as part of the kernel system software. The system engineer must carefully develop security policies versus applying this technology in a brute force way. This paper describes the security issues, the IPSEC standard, testing performed at NSWC-DD and provides an approach to using this technology in the current resource constrained environment using today’s COTS products.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kent, S., and Atkinson, R., RFC2401, Security Architecture for the Internet Protocol, November, 1998.

    Google Scholar 

  2. Kent, S., and Atkinson, R., RFC2402, IP Authentication Header, November, 1998.

    Google Scholar 

  3. Kent, S., and Atkinson, R.,RFC2406, IP Encapsulated Security Payload, November, 1998. or4. Gilmore, J., Cracking DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design, Electronic Frontier Foundation, July, 1998.

    Google Scholar 

  4. Irey, P., Harrison, R., Marlow, D., Techniques for LAN Performance Analysis in a Real-Time Environment, Real-Time Systems-International Journal of Time Critical Computing Systems, Volume 14, Number 1, pp. 21–44, January, 1998.

    Article  Google Scholar 

  5. Mills, D., RFC-1305, Network Time Protocol (Version 3) Specification, Implementation, and Analysis, March, 1992.

    Google Scholar 

  6. Maughan, D., Schertler, M., Schneider, M., and Turner, J., RFC2408, Internet Security Association and Key Management Protocol, November9, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

José Rolim Frank Mueller Albert Y. Zomaya Fikret Ercal Stephan Olariu Binoy Ravindran Jan Gustafsson Hiroaki Takada Ron Olsson Laxmikant V. Kale Pete Beckman Matthew Haines Hossam ElGindy Denis Caromel Serge Chaumette Geoffrey Fox Yi Pan Keqin Li Tao Yang G. Chiola G. Conte L. V. Mancini Domenique Méry Beverly Sanders Devesh Bhatt Viktor Prasanna

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag

About this paper

Cite this paper

Chappell, B.L., Marlow, D.T., Irey, P.M., O’Donoghue, K. (1999). An approach for measuring IP security performance in a distributed environment. In: Rolim, J., et al. Parallel and Distributed Processing. IPPS 1999. Lecture Notes in Computer Science, vol 1586. Springer, Berlin, Heidelberg . https://doi.org/10.1007/BFb0097921

Download citation

  • DOI: https://doi.org/10.1007/BFb0097921

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65831-3

  • Online ISBN: 978-3-540-48932-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics