We present the first Internet architecture designed for control and isolation. We propose to separate ASes into groups of independent routing sub-planes which then in-terconnect to form complete routes. Our architecture, SCI-FI, provides superior resilience and security properties as an intrinsic consequence of good design principles, without needing additional add-on protocols or external checks to provide resilience. Our security analysis shows that SCI-FI can naturally prevent several long-standing security plagues to existing interdomain routing protocols even with their semantics perfectly secured. Our evaluation results further demonstrate SCI-FI’s routing efficiency, path expressiveness, and substantial reliability improvements ove...
In a world with increasing simplicity to store, transfer, and analyze large volumes of data, preserv...
The Internet routing system plays an essential role of glueing together tens of thousands of individ...
Internet routing and forwarding are vulnerable to attacks and misconfigurations that compromise secu...
Network testbeds have empowered networking research and facilitated scientific progress. However, cu...
Adversaries can exploit inter-domain routing vulnerabilities to intercept communication and compromi...
The Internet infrastructure, as it stands today, is highly vulnerable to attacks. The Internet runs ...
Today’s Internet routing architecture faces many challenges, ranging from scaling problems, security...
The Internet consists of tens of thousands of interconnected diverse, self-owned smaller networks. T...
The Internet consists of tens of thousands of interconnected diverse, self-owned smaller networks. T...
The past 20 years have seen the Internet evolve from a network connecting academics, to a critical p...
Internet eXchange Points (IXPs) around the world bring thousands of ISPs together to form dense peer...
5th Generation (5G) and Internet of Things (IoT) have contributed to the rise in connected devices, ...
Abstract—To proactively defend against intruders from readily jeopardizing single-path data sessions...
It is crucial for large-scale communication networks such as the internet to be resilient against at...
Numerous cyberattack incidents have demonstrated adversaries’ capability to cause Internet outages l...
In a world with increasing simplicity to store, transfer, and analyze large volumes of data, preserv...
The Internet routing system plays an essential role of glueing together tens of thousands of individ...
Internet routing and forwarding are vulnerable to attacks and misconfigurations that compromise secu...
Network testbeds have empowered networking research and facilitated scientific progress. However, cu...
Adversaries can exploit inter-domain routing vulnerabilities to intercept communication and compromi...
The Internet infrastructure, as it stands today, is highly vulnerable to attacks. The Internet runs ...
Today’s Internet routing architecture faces many challenges, ranging from scaling problems, security...
The Internet consists of tens of thousands of interconnected diverse, self-owned smaller networks. T...
The Internet consists of tens of thousands of interconnected diverse, self-owned smaller networks. T...
The past 20 years have seen the Internet evolve from a network connecting academics, to a critical p...
Internet eXchange Points (IXPs) around the world bring thousands of ISPs together to form dense peer...
5th Generation (5G) and Internet of Things (IoT) have contributed to the rise in connected devices, ...
Abstract—To proactively defend against intruders from readily jeopardizing single-path data sessions...
It is crucial for large-scale communication networks such as the internet to be resilient against at...
Numerous cyberattack incidents have demonstrated adversaries’ capability to cause Internet outages l...
In a world with increasing simplicity to store, transfer, and analyze large volumes of data, preserv...
The Internet routing system plays an essential role of glueing together tens of thousands of individ...
Internet routing and forwarding are vulnerable to attacks and misconfigurations that compromise secu...