A secure active network environment architecture: realization in SwitchWare
Title | A secure active network environment architecture: realization in SwitchWare |
Publication Type | Journal Articles |
Year of Publication | 1998 |
Authors | Alexander DS, Arbaugh WA, Keromytis AD, Smith JM |
Journal | IEEE Network |
Volume | 12 |
Issue | 3 |
Pagination | 37 - 45 |
Date Published | 1998/06//May |
ISBN Number | 0890-8044 |
Keywords | access protocols, AEGIS secure bootstrap architecture, architecture, Authentication, Collaboration, Communication switching, dynamic integrity checks, extended LAN, Functional programming, implementation, integrity, Intelligent networks, IP networks, Local area networks, network infrastructure, network infrastructures, network operating systems, network-level solutions, node, node-to-node authentication, packet switching, Proposals, ramming system, SANE, secure active network environment architecture, security of data, Switches, SwitchWare, trusted state, Web and internet services |
Abstract | An active network is a network infrastructure which is programmable on a per-user or even per-packet basis. Increasing the flexibility of such network infrastructures invites new security risks. Coping with these security risks represents the most fundamental contribution of active network research. The security concerns can be divided into those which affect the network as a whole and those which affect individual elements. It is clear that the element problems must be solved first, since the integrity of network-level solutions will be based on trust in the network elements. In this article we describe the architecture and implementation of a secure active network environment (SANE), which we believe provides a basis for implementing secure network-level solutions. We guarantee that a node begins operation in a trusted state with the AEGIS secure bootstrap architecture. We guarantee that the system remains in a trusted state by applying dynamic integrity checks in the network element's runtime system, using a novel naming system, and applying node-to-node authentication when needed. The construction of an extended LAN is discussed |
DOI | 10.1109/65.690960 |