Plan System Security

نویسنده

  • Michael Hicks
چکیده

Active Networks o er the ability to program the network on a per-router, per-user, or even per-packet basis. Unfortunately, this added programmability compromises the security of the system by allowing a wider range of potential attacks. Any feasible Active Network architecture therefore requires strong security guarantees. Of course, we would like these guarantees to come at the lowest possible price to the exibility, performance, and usability of the system. The PLAN system is a distributed programming framework we have used to build an Active Network, PLANet [4]. In the PLAN system, code implementing distributed programs is broken into two parts: the PLAN level, and the Service Level. All programs in the PLAN level reside in the messages, or packets, that are sent between the nodes of the system. These programs are written in the Programming Language for Active Networks [6] (or simply, PLAN). PLAN programs serve to `glue' together Service level programs; PLAN may be thought of as a network scripting language. In constrast, Service level programs (or simply, services), reside at each node and are invoked by executing PLAN programs. Services are written in general-purpose languages (in particular, the language that the PLAN interpreter is written in) and may be dynamically loaded. The current Internet (IP and its supporting protocols) allows any user with a network connection to have some basic services. In addition to basic packet delivery provided by IP, basic information services like DNS, finger, and whois, and protocols like HTTP, FTP, TCP, SMTP, and so forth are provided. Similarly, a goal of PLANet is to allow any user of the network to have access to basic services; these services should naturally include some `activeness.' This goal implies that some functionality, like packet delivery in the current Internet, should not require authentication; in PLANet, we allow all `pure' PLAN programs to run unauthenticated. A PLAN program is considered `pure' if it only makes calls to services considered safe; for example, determining the name of the current host is a safe operation, while updating the host's router table is not. Successfully calling unsafe services would require proper authorization. This security policy is stated more formally in the following subsection.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Alert correlation and prediction using data mining and HMM

Intrusion Detection Systems (IDSs) are security tools widely used in computer networks. While they seem to be promising technologies, they pose some serious drawbacks: When utilized in large and high traffic networks, IDSs generate high volumes of low-level alerts which are hardly manageable. Accordingly, there emerged a recent track of security research, focused on alert correlation, which ext...

متن کامل

The effect of Health System Evolution Plan on the performance indices in public hospitals in Iran

Background and Objectives: The Health System Evolution Plan was developed to improve quality and accessibility of health care services and reduce the costs to protect people from catastrophic out of pocket payments. The aim of current study is investigatation of Health System Evolution Plan effects on performance indices of governmental hospitals affiliated to Iran University o...

متن کامل

برنامه ریزی توسعه شبکه انتقال تحت شرایط بازار برق با در نظر گرفتن هزینه برقراری امنیت

An important factor to be considered in electric power system expansion planning is the security of service that the system is able to provide. In restructured power systems, variables such as agents’ profit or Locational Marginal Price (LMP) variances are considered in transmission expansion planning. To have a secure network this plan would be refined for simulated contingencies. This p...

متن کامل

An Analysis of IS Security Policy Evaluation

Information System security evaluation research usually focuses on the evaluation of how well information systems are secured in relation to a security policy statement or security plan. Most studies concentrate on standards of security measurement such as the “orange book”, or the European standard (ITSEC). Little research however, concentrates on the manner in which security plans (or policie...

متن کامل

Social Security related legislation in 1989.

Public Law 99-509, enacted on October 21, 1986, contains the following provisions related to the oldage, survivors, and disability insurance (OASDI) program: Section 6001-Change in starting date of Federal thrift savings plan. Delays until April 1, 1987, the date that Federal employees mandatorily participating in the Federal Employees’ Retirement System (FERS),2 the new retirement system for e...

متن کامل

Plan Recognition in Intrusion Detection Systems

To be effective, current intrusion detection systems (IDSs) must incorporate artificial intelligence methods for plan recognition. Plan recognition is critical both to predicting the future actions of attackers and planning appropriate responses to their actions. However network security places a new set of requirements on plan recognition. In this paper we present an argument for including pla...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998