Predicate routing: Enabling controlled networking

T Roscoe, S Hand, R Isaacs, R Mortier… - ACM SIGCOMM …, 2003 - dl.acm.org
T Roscoe, S Hand, R Isaacs, R Mortier, P Jardetzky
ACM SIGCOMM Computer Communication Review, 2003dl.acm.org
The Internet lacks a coherent model which unifies security (in terms of where packets are
allowed to go) and routing (where packets should be sent), even in constrained
environments. While automated configuration tools are appearing for parts of this problem, a
general solution is still unavailable. Routing and firewalling are generally treated as
separate problems, in spite of their clear connection. In particular, security policies in data
hosting centers, enterprise networks, and backbones are still by and large installed …
The Internet lacks a coherent model which unifies security (in terms of where packets are allowed to go) and routing (where packets should be sent), even in constrained environments. While automated configuration tools are appearing for parts of this problem, a general solution is still unavailable. Routing and firewalling are generally treated as separate problems, in spite of their clear connection. In particular, security policies in data hosting centers, enterprise networks, and backbones are still by and large installed manually, and are prone to problems from errors and misconfigurations. In this paper, we present Predicate Routing (PR) as a solution to this problem. We briefly describe our centralized implementation and then outline the extension of Internet routing protocols to support Predicate Routing.
In current IP networks, the state of the system is primarily represented in an imperative fashion: routing tables and firewall rulesets local to each node strictly specify the action to be performed on each arriving packet. In contrast, Predicate Routing represents the state of the network declaratively as a set of boolean expressions associated with links which assert which kinds of packet can appear where. From these expressions, routing tables and filter rules are derived automatically. Conversely, the consequences of a change in network state can be calculated for any point in the network (link, router, or end system), and predicates derived from known configuration state of routers and links. This subsumes notions of both routing and firewalling.
ACM Digital Library
Showing the best result for this search. See all results