Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Internet Shared Resources Framework


Affiliations
1 Department of Computer Science and Engineering at RV College of Engineering, Bangalore-59, India
2 Dr. MGR University, Chennai, India
     

   Subscribe/Renew Journal


Resource sharing is also complicated by the absence of a complete and accurate level map of the internet. Without this map, an understanding of the distribution and usage patterns of network resources are limited. The location of routers and links and how they are shared are unknown and obtaining this map is difficult. Existing internet protocols were not explicitly designed for monitoring of further internet service providers (ISP’s).The local networks maps using are only known. In many cases active measurements and observations the network maps are inferred partially the internet’s size, hardware diversity and ISP policy make these maps incomplete and inaccurate. Also, active measurements are limited by administrators who confuse measurement probes for attacks and generate “ abuse reports “ and even legal threats curtail the scope of experiments. What can be done to improve the completeness and accuracy of the map of the internet without causing the ire of network administrators? It is possible to secure and discover shared internet resources without global protocol redeployment or architecture support.

The proposed work is focused on design and evaluation of protocols that secure the internet’s shared resources without requiring network support or global protocol redeployment. The notion of security varies with respect to the attack model. This work demonstrates security in three distinct user assumptions, Co-operative, selfish and malicious users. Novel techniques for increasing the accuracy and completeness of internet topology discovery are designed and evaluated. These techniques leverage existing protocol and hardware features and thus can be implemented on today’s internet.


Keywords

Convergence, Co-Operative, Internet, Leverage, Malicious, Protocol, Resources, Selfish, Security, Sharing.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 189

PDF Views: 1




  • Internet Shared Resources Framework

Abstract Views: 189  |  PDF Views: 1

Authors

G. S. Nagaraja
Department of Computer Science and Engineering at RV College of Engineering, Bangalore-59, India
H. V. Ramakrishnan
Dr. MGR University, Chennai, India

Abstract


Resource sharing is also complicated by the absence of a complete and accurate level map of the internet. Without this map, an understanding of the distribution and usage patterns of network resources are limited. The location of routers and links and how they are shared are unknown and obtaining this map is difficult. Existing internet protocols were not explicitly designed for monitoring of further internet service providers (ISP’s).The local networks maps using are only known. In many cases active measurements and observations the network maps are inferred partially the internet’s size, hardware diversity and ISP policy make these maps incomplete and inaccurate. Also, active measurements are limited by administrators who confuse measurement probes for attacks and generate “ abuse reports “ and even legal threats curtail the scope of experiments. What can be done to improve the completeness and accuracy of the map of the internet without causing the ire of network administrators? It is possible to secure and discover shared internet resources without global protocol redeployment or architecture support.

The proposed work is focused on design and evaluation of protocols that secure the internet’s shared resources without requiring network support or global protocol redeployment. The notion of security varies with respect to the attack model. This work demonstrates security in three distinct user assumptions, Co-operative, selfish and malicious users. Novel techniques for increasing the accuracy and completeness of internet topology discovery are designed and evaluated. These techniques leverage existing protocol and hardware features and thus can be implemented on today’s internet.


Keywords


Convergence, Co-Operative, Internet, Leverage, Malicious, Protocol, Resources, Selfish, Security, Sharing.