2015 IEEE 23rd International Conference on Network Protocols (ICNP) 2015
DOI: 10.1109/icnp.2015.22
|View full text |Cite
|
Sign up to set email alerts
|

FAIR: Forwarding Accountability for Internet Reputability

Abstract: Abstract-This paper presents FAIR, a forwarding accountability mechanism that incentivizes ISPs to apply stricter security policies to their customers. The Autonomous System (AS) of the receiver specifies a traffic profile that the sender AS must adhere to. Transit ASes on the path mark packets. In case of traffic profile violations, the marked packets are used as a proof of misbehavior.FAIR introduces low bandwidth overhead and requires no per-packet and no per-flow state for forwarding. We describe integrati… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 35 publications
0
8
0
Order By: Relevance
“…To enable on-line distribution of secrets, Bruhadeshwar et al [117] presented key distribution protocols for [116]. Similar source and path validation methods were also presented in [118,119,120,121,122]. Typically, these works enforce the routers to add a cryptographic primitive to each packet and, thus, ensure that the traffic traverses the correct path.…”
Section: Proposals Securing the Data Planementioning
confidence: 99%
“…To enable on-line distribution of secrets, Bruhadeshwar et al [117] presented key distribution protocols for [116]. Similar source and path validation methods were also presented in [118,119,120,121,122]. Typically, these works enforce the routers to add a cryptographic primitive to each packet and, thus, ensure that the traffic traverses the correct path.…”
Section: Proposals Securing the Data Planementioning
confidence: 99%
“…They examine the evidence in the same way as the source AS and approve or reject the complaint. Based on the approvals and rejections, the ASes can determine the root of the problem, because each complaint is accepted at least by the benign cooperating ASes adjacent to the destination, as shown in FAIR [12].…”
Section: Protest (Stage 3)mentioning
confidence: 99%
“…The length increase is inevitable, but certain measures can limit the introduced overhead. For instance, a short MAC (4 bits) per ISP is enough to enable misbehavior detection in the context of flooding attacks [12].…”
Section: Performance Challengesmentioning
confidence: 99%
See 2 more Smart Citations