Abstract | ||
---|---|---|
Todays networks are awash in illegitimate traffic: port scans, propagating worms, and illegal peer-to-peer transfers of materials [8]. This “noise” has created such a crescendo that legitimate traffic is starved for network resources. Essential network services, like DNS and remote file systems, are rendered unavailable. The challenge is no longer “quality of service” but rather “any service at all”. Techniques must be developed to identify and segregate traffic into good, bad, and suspicious classes. Quality of Service should now protect the good, block the bad, and slow the ugly when the network is under stress of high resource utilization. We discuss the research challenges and outline a possible architectural approach: COPS (Checking, Observing, and Protecting Services). It is founded on “Inspection-and-Action Boxes” (iBoxes) and packet annotations. The former are middlebox network elements able to inspect packets deeply while performing filtering, shaping, and labelling actions upon them. The latter is a new layer between routing and transport that tags packets for control purposes while also providing an in-band control plane for managing iBoxes across a network. |
Year | DOI | Venue |
---|---|---|
2005 | 10.1007/11499169_1 | IWQoS |
Keywords | Field | DocType |
resource utilization,quality of service | Network service,Service quality,Middlebox,Peer-to-peer,Computer security,Computer science,Network address translation,Network packet,Computer network,Quality of service,Network element | Conference |
Volume | ISSN | ISBN |
3552 | 0302-9743 | 3-540-26294-6 |
Citations | PageRank | References |
2 | 0.39 | 7 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Randy H. Katz | 1 | 16819 | 3018.89 |
George Porter | 2 | 1209 | 69.26 |
Scott Shenker | 3 | 29892 | 2677.04 |
I. Stoica | 4 | 21406 | 1710.11 |
Mel Tsai | 5 | 2 | 0.39 |