skip to main content
10.1145/3180465.3180475acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
short-paper
Public Access

Internet Security Liberated via Software Defined Exchanges

Published: 14 March 2018 Publication History

Abstract

With software defined networking and network function virtualization technologies, networks can be programmed to have customized processing and paths for different traffic at manageable costs and for massive numbers of applications. Now, picture a future Internet where each entity - a person, an organization, or an autonomous system - has the ability to choose how traffic in their respective network sessions is routed and processed between itself and its counterparts. The network is, essentially, liberated from today's homogeneous IP-based routing and limited connection options. To realize such a network paradigm, we propose a software defined exchange architecture that can provide the needed network programmability, session-level customization, and scale. We present a case study for traffic-analysis-resistant communication among individuals, campuses, or web services, where IP addresses no longer need to have a one-to-one correspondence with service providers.

References

[1]
Noah Apthorpe, Dillon Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster. 2017. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic. arXiv preprint arXiv:1708.05044 (2017).
[2]
Simurgh Aryan, Homa Aryan, and J Alex Halderman. 2013. Internet Censorship in Iran: A First Look. In FOCI.
[3]
Tony Bates, Philip Smith, and Geoff Huston. 2018. CIDR Report. (2018). http://www.cidr-report.org/as2.0/.
[4]
Russell Brandom. 2015. A network error routed traffic for the UK's nuclear weapons agency through Russian telecom. (March. 2015). https://www.theverge.com/2015/3/13/8208413/uk-nuclear-weapons-russia-traffic-redirect.
[5]
Nikolaos Chatzis, Georgios Smaragdakis, Jan Böttger, Thomas Krenc, and Anja Feldmann. 2013. On the benefits of using a large IXP as an Internet vantage point Proceedings of the 2013 conference on Internet measurement conference. ACM, 333--346.
[6]
Vince Dattoria, Inder Monga, Bryan Lyles, Kevin Thompson, and Grant Miller. 2013. SDN Program Review Final Report. (December. 2013). https://www.orau.gov/sdnpr2013/.
[7]
Peyman Faratin, David D Clark, Steven Bauer, William Lehr, Patrick W Gilmore, and Arthur Berger. 2008. The growing complexity of Internet interconnection. (2008).
[8]
Arpit Gupta, Laurent Vanbever, Muhammad Shahbaz, Sean P Donovan, Brandon Schlinker, Nick Feamster, Jennifer Rexford, Scott Shenker, Russ Clark, and Ethan Katz-Bassett. 2015. SDX: A software defined internet exchange. ACM SIGCOMM Computer Communication Review Vol. 44, 4 (2015), 551--562.
[9]
Panos Kampanakis, Harry Perros, and Tsegereda Beyene. 2014. SDN-based solutions for moving target defense network protection World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2014 IEEE 15th International Symposium on a. IEEE, 1--6.
[10]
Joe Mambretti, Jim Chen, and Fei Yeh. 2014. Software-defined network exchanges (SDXs): Architecture, services, capabilities, and foundation technologies. In Teletraffic Congress (ITC), 2014 26th International. IEEE, 1--6.
[11]
Lu Yu, Qing Wang, Geddings Barrineau, Jon Oakley, Richard R Brooks, and Kuang-Ching Wang. 2017. TARN: A SDN-based Traffic Analysis Resistant Network Architecture. arXiv preprint arXiv:1709.00782 (2017).
[12]
Kim Zeeter. 2017. Someone's Been Siphoning Data Through a Huge Security Hole in the Internet. (April. 2017). https://www.wired.com/2013/12/bgp-hijacking-belarus-iceland/.

Cited By

View all
  • (2023)A Lossless-Recovery Secret Distribution Scheme Based on QR CodesEntropy10.3390/e2504065325:4(653)Online publication date: 13-Apr-2023
  • (2018)Traffic Analysis Countermeasures Using Software-Defined Internet Exchanges2018 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC)10.1109/MoNeTeC.2018.8572098(1-6)Online publication date: Oct-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SDN-NFV Sec'18: Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization
March 2018
64 pages
ISBN:9781450356350
DOI:10.1145/3180465
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 March 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. censorship circumvention
  2. cloud
  3. geni
  4. internet architecture
  5. peering
  6. sdn
  7. sdx
  8. wide area network

Qualifiers

  • Short-paper

Funding Sources

Conference

CODASPY '18
Sponsor:

Acceptance Rates

Overall Acceptance Rate 11 of 30 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)81
  • Downloads (Last 6 weeks)9
Reflects downloads up to 01 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)A Lossless-Recovery Secret Distribution Scheme Based on QR CodesEntropy10.3390/e2504065325:4(653)Online publication date: 13-Apr-2023
  • (2018)Traffic Analysis Countermeasures Using Software-Defined Internet Exchanges2018 International Scientific and Technical Conference Modern Computer Network Technologies (MoNeTeC)10.1109/MoNeTeC.2018.8572098(1-6)Online publication date: Oct-2018

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media