Skip to main content

A Secure Plan

  • Conference paper
Active Networks (IWAN 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1653))

Included in the following conference series:

Abstract

Active Networks promise greater flexibility than current networks, but threaten safety and security by virtue of their programmability. In this paper, we describe the design and implementation of a security architecture for the active network PLANet [HMA+99]. Security is obtained with a two-level architecture that combines a functionally restricted packet language, PLAN [HKM+98], with an environment of general-purpose service routines governed by trust management [BFL96]. In particular, we employ a technique which expands or contracts a packet’s service environment based on its level of privilege, termed namespace-based security. As an application of our security architecture, we outline the design and implementation of an active-network firewall. We find that the addition of the firewall imposes an approximately 34% latency overhead and as little as a 6.7% space overhead to incoming packets.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Alexander, D.S., Arbaugh, W.A., Hicks, M., Kakkar, P., Keromytis, A.D., Moore, J.T., Gunter, C.A., Nettles, S.M., Smith, J.M.: The SwitchWare Active Network Architecture. IEEE Network Magazine, special issue on Active and Programmable Networks 12(3), 29–36 (1998)

    Google Scholar 

  2. Alexander, D.S., Arbaugh, W.A., Keromytis, A.D., Smith, J.M.: A Secure Active Network Environment Architecture: Realization in SwitchWare. IEEE Network Magazine, special issue on Active and Programmable Networks 12(3), 37–45 (1998)

    Google Scholar 

  3. Alexander, D.S., Arbaugh, W.A., Keromytis, A.D., Smith, J.M.: Security in Active Networks. In: Secure Internet Programming [VJ99] (1999)

    Google Scholar 

  4. Alexander, D.S.: ALIEN: A Generalized Computing Model of Active Networks. PhD thesis, University of Pennsylvania (September 1998)

    Google Scholar 

  5. Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The Role of Trust Management in Distributed Systems Security. In: Secure Internet Programming [VJ99] (1999)

    Google Scholar 

  6. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 17th Symposium on Security and Privacy, pp. 164–173. IEEE Computer Society Press, Los Alamitos (1996)

    Google Scholar 

  7. Bershad, B., Savage, S., Pardyak, P., Sirer, E.G., Fiuczynski, M., Becker, D., Eggers, S., Chambers, C.: Extensibility, Safety and Performance in the SPIN Operating System. In: Proceedings of 15th Symposium on Operating Systems Principles, December 1995, pp. 267–284 (1995)

    Google Scholar 

  8. Chase, J.S., Levy, H.M., Feeley, M.J., Lazowska, E.D.: Sharing and Protection in a Single-Address-Space Operating System. ACM Transactions on Computer systems (November 1994)

    Google Scholar 

  9. Gunter, C.A., Jim, T.: Policy-Directed Certificate Retrieval (1998), http://www.cis.upenn.edu/~qcm

  10. Hawblitzel, C., Chang, C., Czajkowski, G.: Implementing Multiple Protection Domains in Java. In: Proceedings of the 1998 USENIX Annual Technical Conference, June 1998, pp. 259–270 (1998)

    Google Scholar 

  11. Hicks, M.: PLAN System Security. Technical Report MS-CIS-98-25, Department of Computer and Information Science, University of Pennsylvania (April 1998)

    Google Scholar 

  12. Hicks, M., Keromytis, A.D.: A Secure PLAN. Technical Report MS-CIS-99-14, Department of Computer and Information Science, University of Pennsylvania (May 1999)

    Google Scholar 

  13. Hicks, M., Kakkar, P., Moore, J.T., Gunter, C.A., Nettles, S.: PLAN: A Packet Language for Active Networks. In: Proceedings of the Third ACM SIGPLAN International Conference on Functional Programming Languages, pp. 86–93. ACM, New York (1998)

    Chapter  Google Scholar 

  14. Hicks, M., Moore, J.T., Alexander, D.S., Gunter, C.A., Nettles, S.: PLANet: An Active Internetwork. In: Proceedings of the Eighteenth IEEE Computer and Communication Society INFOCOM Conference, pp. 1124–1133. IEEE, Los Alamitos (1999)

    Google Scholar 

  15. Leroy, X.: The Caml Special Light System (Release 1.10), http://pauillac.inria.fr/ocaml

  16. Levy, J.Y., Ousterhout, J.K., Welch, B.B.: The Safe-Tcl Security Model. In: Proceedings of the 1998 USENIX Annual Technical Conference, June 1998, pp. 271–282 (1998)

    Google Scholar 

  17. Leroy, X., Rouaix, F.: Security properties of typed applets. In: Secure Internet Programming [VJ99]

    Google Scholar 

  18. Moore, J.: Mobile Code Security Techniques. Technical Report MS-CIS-98-28, University of Pennsylvania (May 1998)

    Google Scholar 

  19. Milner, R., Tofte, M., Harper, R.: The Definition of Standard ML. The MIT Press, Cambridge (1990)

    Google Scholar 

  20. Security Architecture for Active Nets (June 1998), Draft available at http://www.ittc.ukans.edu/~ansecure/0079.html

  21. Necula, G.C.: Proof-Carrying Code. In: Proceedings of the 24th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 106–119. ACM Press, New York (1997)

    Chapter  Google Scholar 

  22. Necula, G.C., Lee, P.: Safe Kernel Extensions Without Run-Time Checking. In: Second Symposium on Operating System Design and Implementation, Usenix, Seattle, pp. 229–243 (1996)

    Google Scholar 

  23. von Eicken, T.: J-Kernel a capability based operating system for Java. In: Secure Internet Programming [VJ99]

    Google Scholar 

  24. Vitek, J., Jensen, C.: Secure Internet Programming: Security Issues for Mobile and Distributed Objects. LNCS. Springer, New York (1999)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hicks, M., Keromytis, A.D. (1999). A Secure Plan. In: Covaci, S. (eds) Active Networks. IWAN 1999. Lecture Notes in Computer Science, vol 1653. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-48507-0_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-48507-0_28

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66238-9

  • Online ISBN: 978-3-540-48507-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics