93 research outputs found

    Implementing IPsec using the Five-layer security framework and FPGAs.

    Get PDF

    An Overview of Cryptography (Updated Version, 3 March 2016)

    Get PDF
    There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting passwords. One essential aspect for secure communications is that of cryptography...While cryptography is necessary for secure communications, it is not by itself sufficient. This paper describes the first of many steps necessary for better security in any number of situations. A much shorter, edited version of this paper appears in the 1999 edition of Handbook on Local Area Networks published by Auerbach in September 1998

    A framework for IPSec functional architecture.

    Get PDF
    In today\u27s network, various stand-alone security services and/or proxies are used to provide different security services. These individual security systems implementing one single security function cannot address security needs of evolving networks that require secure protocol such as IPSec. In this paper, we provide a framework for implementing IPSec security functions in a well structured functional architecture. The proposed architecture is modular and allows for composing software applications from products commercially available and developed by different suppliers to implement the entire security requirements of IPSec protocol. In addition the proposed architecture is robust in the sense that it supports open standards and interfaces, and implements security functions of IPSec as an integrated solution under a unified security management system.Dept. of Electrical and Computer Engineering. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis2005 .F34. Source: Masters Abstracts International, Volume: 44-03, page: 1451. Thesis (M.Sc.)--University of Windsor (Canada), 2005

    A Survey on Data Plane Programming with P4: Fundamentals, Advances, and Applied Research

    Full text link
    With traditional networking, users can configure control plane protocols to match the specific network configuration, but without the ability to fundamentally change the underlying algorithms. With SDN, the users may provide their own control plane, that can control network devices through their data plane APIs. Programmable data planes allow users to define their own data plane algorithms for network devices including appropriate data plane APIs which may be leveraged by user-defined SDN control. Thus, programmable data planes and SDN offer great flexibility for network customization, be it for specialized, commercial appliances, e.g., in 5G or data center networks, or for rapid prototyping in industrial and academic research. Programming protocol-independent packet processors (P4) has emerged as the currently most widespread abstraction, programming language, and concept for data plane programming. It is developed and standardized by an open community and it is supported by various software and hardware platforms. In this paper, we survey the literature from 2015 to 2020 on data plane programming with P4. Our survey covers 497 references of which 367 are scientific publications. We organize our work into two parts. In the first part, we give an overview of data plane programming models, the programming language, architectures, compilers, targets, and data plane APIs. We also consider research efforts to advance P4 technology. In the second part, we analyze a large body of literature considering P4-based applied research. We categorize 241 research papers into different application domains, summarize their contributions, and extract prototypes, target platforms, and source code availability.Comment: Submitted to IEEE Communications Surveys and Tutorials (COMS) on 2021-01-2

    Branch Prediction For Network Processors

    Get PDF
    Originally designed to favour flexibility over packet processing performance, the future of the programmable network processor is challenged by the need to meet both increasing line rate as well as providing additional processing capabilities. To meet these requirements, trends within networking research has tended to focus on techniques such as offloading computation intensive tasks to dedicated hardware logic or through increased parallelism. While parallelism retains flexibility, challenges such as load-balancing limit its scope. On the other hand, hardware offloading allows complex algorithms to be implemented at high speed but sacrifice flexibility. To this end, the work in this thesis is focused on a more fundamental aspect of a network processor, the data-plane processing engine. Performing both system modelling and analysis of packet processing functions; the goal of this thesis is to identify and extract salient information regarding the performance of multi-processor workloads. Following on from a traditional software based analysis of programme workloads, we develop a method of modelling and analysing hardware accelerators when applied to network processors. Using this quantitative information, this thesis proposes an architecture which allows deeply pipelined micro-architectures to be implemented on the data-plane while reducing the branch penalty associated with these architectures

    Analyse de sécurité et QoS dans les réseaux à contraintes temporelles

    Get PDF
    Dans le domaine des rĂ©seaux, deux prĂ©cieux objectifs doivent ĂȘtre atteints, Ă  savoir la QoS et la sĂ©curitĂ©, plus particuliĂšrement lorsqu’il s’agit des rĂ©seaux Ă  caractĂšre critique et Ă  fortes contraintes temporelles. Malheureusement, un conflit existe : tandis que la QoS Ɠuvre Ă  rĂ©duire les temps de traitement, les mĂ©canismes de sĂ©curitĂ© quant Ă  eux requiĂšrent d’importants temps de traitement et causent, par consĂ©quent, des dĂ©lais et dĂ©gradent la QoS. Par ailleurs, les systĂšmes temps rĂ©el, la QoS et la sĂ©curitĂ© ont trĂšs souvent Ă©tĂ© Ă©tudiĂ©s sĂ©parĂ©ment, par des communautĂ©s diffĂ©rentes. Dans le contexte des rĂ©seaux avioniques de donnĂ©es, de nombreux domaines et applications, de criticitĂ©s diffĂ©rentes, Ă©changent mutuellement des informations, souvent Ă  travers des passerelles. Il apparaĂźt clairement que ces informations prĂ©sentent diffĂ©rents niveaux de sensibilitĂ© en termes de sĂ©curitĂ© et de QoS. Tenant compte de cela, le but de cette thĂšse est d’accroĂźtre la robustesse des futures gĂ©nĂ©rations de rĂ©seaux avioniques de donnĂ©es en contrant les menaces de sĂ©curitĂ© et Ă©vitant les ruptures de trafic de donnĂ©es. A cet effet, nous avons rĂ©alisĂ© un Ă©tat de l’art des mĂ©canismes de sĂ©curitĂ©, de la QoS et des applications Ă  contraintes temporelles. Nous avons, ensuite Ă©tudiĂ© la nouvelle gĂ©nĂ©ration des rĂ©seaux avioniques de donnĂ©es. Chose qui nous a permis de dĂ©terminer correctement les diffĂ©rentes menaces de sĂ©curitĂ©. Sur la base de cette Ă©tude, nous avons identifiĂ© Ă  la fois les exigences de sĂ©curitĂ© et de QoS de cette nouvelle gĂ©nĂ©ration de rĂ©seaux avioniques. Afin de les satisfaire, nous avons proposĂ© une architecture de passerelle de sĂ©curitĂ© tenant compte de la QoS pour protĂ©ger ces rĂ©seaux avioniques et assurer une haute disponibilitĂ© en faveur des donnĂ©es critiques. Pour assurer l’intĂ©gration des diffĂ©rentes composantes de la passerelle, nous avons dĂ©veloppĂ© une table de session intĂ©grĂ©e permettant de stocker toutes les informations nĂ©cessaires relatives aux sessions et d’accĂ©lĂ©rer les traitements appliquĂ©s aux paquets (filtrage Ă  Ă©tats, les traductions d’adresses NAT, la classification QoS et le routage). Cela a donc nĂ©cessitĂ©, en premier lieu, l'Ă©tude de la structure existante de la table de session puis, en second lieu, la proposition d'une toute nouvelle structure rĂ©pondant Ă  nos objectifs. Aussi, avons-nous prĂ©sentĂ© un algorithme permettant l’accĂšs et l’exploitation de la nouvelle table de session intĂ©grĂ©e. En ce qui concerne le composant VPN IPSec, nous avons dĂ©tectĂ© que le trafic chiffrĂ© par le protocole ESP d’IPSec ne peut pas ĂȘtre classĂ© correctement par les routeurs de bordure. Afin de surmonter ce problĂšme, nous avons dĂ©veloppĂ© un protocole, Q-ESP, permettant la classification des trafics chiffrĂ©s et offrant les services de sĂ©curitĂ© fournis par les protocoles AH et ESP combinĂ©s. Plusieurs techniques de gestion de bande passante ont Ă©tĂ© dĂ©veloppĂ©es en vue d’optimiser la gestion du trafic rĂ©seau. Pour Ă©valuer les performances offertes par ces techniques et identifier laquelle serait la plus appropriĂ©e dans notre cas, nous avons effectuĂ© une comparaison basĂ©e sur le critĂšre du dĂ©lai, par le biais de tests expĂ©rimentaux. En derniĂšre Ă©tape, nous avons Ă©valuĂ© et comparĂ© les performances de la passerelle de sĂ©curitĂ© que nous proposons par rapport Ă  trois produits commerciaux offrant les fonctions de passerelle de sĂ©curitĂ© logicielle en vue de dĂ©terminer les points forts et faibles de notre implĂ©mentation pour la dĂ©velopper ultĂ©rieurement. Le manuscrit s’organise en deux parties : la premiĂšre est rĂ©digĂ©e en français et reprĂ©sente un rĂ©sumĂ© dĂ©taillĂ© de la deuxiĂšme partie qui est, quant Ă  elle, rĂ©digĂ©e en anglais. ABSTRACT : QoS and security are two precious objectives for network systems to attain, especially for critical networks with temporal constraints. Unfortunately, they often conflict; while QoS tries to minimize the processing delay, strong security protection requires more processing time and causes traffic delay and QoS degradation. Moreover, real-time systems, QoS and security have often been studied separately and by different communities. In the context of the avionic data network various domains and heterogeneous applications with different levels of criticality cooperate for the mutual exchange of information, often through gateways. It is clear that this information has different levels of sensitivity in terms of security and QoS constraints. Given this context, the major goal of this thesis is then to increase the robustness of the next generation e-enabled avionic data network with respect to security threats and ruptures in traffic characteristics. From this perspective, we surveyed the literature to establish state of the art network security, QoS and applications with time constraints. Then, we studied the next generation e-enabled avionic data network. This allowed us to draw a map of the field, and to understand security threats. Based on this study we identified both security and QoS requirements of the next generation e-enabled avionic data network. In order to satisfy these requirements we proposed the architecture of QoS capable integrated security gateway to protect the next generation e-enabled avionic data network and ensure the availability of critical traffic. To provide for a true integration between the different gateway components we built an integrated session table to store all the needed session information and to speed up the packet processing (firewall stateful inspection, NAT mapping, QoS classification and routing). This necessitates the study of the existing session table structure and the proposition of a new structure to fulfill our objective. Also, we present the necessary processing algorithms to access the new integrated session table. In IPSec VPN component we identified the problem that IPSec ESP encrypted traffic cannot be classified appropriately by QoS edge routers. To overcome this problem, we developed a Q-ESP protocol which allows the classifications of encrypted traffic and combines the security services provided by IPSec ESP and AH. To manage the network traffic wisely, a variety of bandwidth management techniques have been developed. To assess their performance and identify which bandwidth management technique is the most suitable given our context we performed a delay-based comparison using experimental tests. In the final stage, we benchmarked our implemented security gateway against three commercially available software gateways. The goal of this benchmark test is to evaluate performance and identify problems for future research work. This dissertation is divided into two parts: in French and in English respectively. Both parts follow the same structure where the first is an extended summary of the second

    Demystifying Internet of Things Security

    Get PDF
    Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms

    Advancing SDN from OpenFlow to P4: a survey

    Get PDF
    Software-defined Networking (SDN) marked the beginning of a new era in the field of networking by decoupling the control and forwarding processes through the OpenFlow protocol. The Next Generation SDN is defined by Open Interfaces and full programmability of the data plane. P4 is a domain-specific language that fulfills these requirements and has known wide adoption over recent years from Academia and Industry. This work is an extensive survey of the P4 language covering domains of application, a detailed overview of the language, and future directions

    Cyber Security and Critical Infrastructures 2nd Volume

    Get PDF
    The second volume of the book contains the manuscripts that were accepted for publication in the MDPI Special Topic "Cyber Security and Critical Infrastructure" after a rigorous peer-review process. Authors from academia, government and industry contributed their innovative solutions, consistent with the interdisciplinary nature of cybersecurity. The book contains 16 articles, including an editorial that explains the current challenges, innovative solutions and real-world experiences that include critical infrastructure and 15 original papers that present state-of-the-art innovative solutions to attacks on critical systems
    • 

    corecore