DocumentCode :
3264755
Title :
The case for network witnesses
Author :
Feng, Wu-Chang ; Schluessler, Travis
Author_Institution :
Portland State Univ., Portland, OR
fYear :
2008
fDate :
19-19 Oct. 2008
Firstpage :
9
Lastpage :
14
Abstract :
Network abuse is prevalent in todaypsilas Internet. To combat abuse, this paper examines a general approach for constructing network protocols based on the use of ldquonetwork witnessesrdquo: tamper-resistant, trusted third parties that reside at network protocol end-points. By providing authentic measurements of network use and by ensuring the correct usage of network protocols, we show how network witnesses can enable fundamentally new protocol designs that can protect networks against malicious use.
Keywords :
Internet; security of data; Internet; network abuse; network protocols; network witnesses; Access control; Computer hacking; Costs; Cryptography; Hardware; IP networks; Protection; Protocols; Technology management; Telecommunication traffic;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Secure Network Protocols, 2008. NPSec 2008. 4th Workshop on
Conference_Location :
Orlando, FL
Print_ISBN :
978-1-4244-2651-5
Electronic_ISBN :
978-1-4244-2652-2
Type :
conf
DOI :
10.1109/NPSEC.2008.4664874
Filename :
4664874
Link To Document :
بازگشت