Title :
The case for network witnesses
Author :
Feng, Wu-Chang ; Schluessler, Travis
Author_Institution :
Portland State Univ., Portland, OR
Abstract :
Network abuse is prevalent in todaypsilas Internet. To combat abuse, this paper examines a general approach for constructing network protocols based on the use of ldquonetwork witnessesrdquo: tamper-resistant, trusted third parties that reside at network protocol end-points. By providing authentic measurements of network use and by ensuring the correct usage of network protocols, we show how network witnesses can enable fundamentally new protocol designs that can protect networks against malicious use.
Keywords :
Internet; security of data; Internet; network abuse; network protocols; network witnesses; Access control; Computer hacking; Costs; Cryptography; Hardware; IP networks; Protection; Protocols; Technology management; Telecommunication traffic;
Conference_Titel :
Secure Network Protocols, 2008. NPSec 2008. 4th Workshop on
Conference_Location :
Orlando, FL
Print_ISBN :
978-1-4244-2651-5
Electronic_ISBN :
978-1-4244-2652-2
DOI :
10.1109/NPSEC.2008.4664874