Efficient DoS-limiting Support by Indirect Mapping in Networks with Locator/Identifier Separation
نویسندگان
چکیده
Recent research in the designing of an elegant mapping service to map identifiers onto locators in networks with locator/identifier separation, focuses on solving practical issues related to mapping system. However, how to provide entire secure support in separation networks is still an open issue. In this paper, we present the design and evaluation of a hierarchical indirect mapping system (HIMS). It provides indirect mapping from connection identifier (CID), a novel flat identifier space introduced to stamp packets, to endpoint identifier (EID), can limit the impact of full range of destination attacks such as Denial of Service (DoS) floods from the outset by EID hidden, and fulfills the requirements such as low latency, efficient network utilization and scalability. Based on an efficient merging rule, HIMS build a hierarchical Chord architecture which can scale to Internet level by preserving the locality and convergence of the inter-domain path. We present scalability assessment and numerical results to demonstrate the performance gains of the proposed approach.
منابع مشابه
Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation
As a basic prerequisite for worm detection based on computational intelligence in networks with locator/identifier separation, it is well worth considering the influence on worm propagation due to the incoming locator/identifier separation. In this paper, according to the characteristics of locator/identifier separation, we systematically analyze the mitigation of worm propagation in three aspe...
متن کاملImplementing the Locator/ID Separation Protocol: Design and experience
During the last few years, the network research community and the industry have been working on the design of an alternate Internet Routing Architecture aiming at solving the issues arising in the current architecture. It is widely accepted that applying a Locator/ID Separation paradigm would result in a more scalable and flexible architecture. As the name suggests, in Locator/ID Separation the...
متن کاملHow Fast do Identifier-to-locator Mappings Change in Networks with Identifier/Locator Separation?
There is a growing consensus that identifier/locator separation is a promising solution to the scalability issue of the current routing infrastructure. After locators are separated from identifiers, end hosts roam from place to place without changing their identifiers. On the other hand, their locators change when they roam from one place to another, which leads to changes of identifier-to-loca...
متن کاملA hash-based distributed mapping control scheme in mobile locator-identifier separation protocol networks
متن کامل
Locator/ID Separation Protocol Alternative Logical Topology (LISP+ALT)
This document describes a simple distributed index system to be used by a Locator/ID Separation Protocol (LISP) Ingress Tunnel Router (ITR) or Map-Resolver (MR) to find the Egress Tunnel Router (ETR) that holds the mapping information for a particular Endpoint Identifier (EID). The MR can then query that ETR to obtain the actual mapping information, which consists of a list of Routing Locators ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- JNW
دوره 8 شماره
صفحات -
تاریخ انتشار 2013