Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation

Validating the network paths taken by packets is critical in constructing a secure Internet architecture. Any feasible solution must both enforce packet forwarding along end-host specified paths and verify whether packets have taken those paths. However, the current Internet supports neither enforce...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACM computing surveys 2021-09, Vol.53 (5), p.1-34
Hauptverfasser: Bu, Kai, Laird, Avery, Yang, Yutian, Cheng, Linfeng, Luo, Jiaqing, Li, Yingjiu, Ren, Kui
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 34
container_issue 5
container_start_page 1
container_title ACM computing surveys
container_volume 53
creator Bu, Kai
Laird, Avery
Yang, Yutian
Cheng, Linfeng
Luo, Jiaqing
Li, Yingjiu
Ren, Kui
description Validating the network paths taken by packets is critical in constructing a secure Internet architecture. Any feasible solution must both enforce packet forwarding along end-host specified paths and verify whether packets have taken those paths. However, the current Internet supports neither enforcement nor verification. Likely due to the radical changes to the Internet architecture and a long-standing confusion between routing and forwarding, only limited solutions for path validation exist in the literature. This survey article aims to reinvigorate research on the essential topic of path validation by crystallizing not only how path validation works but also where seemingly qualified solutions fall short. The analyses explore future research directions in path validation aimed at improving security, privacy, and efficiency.
doi_str_mv 10.1145/3409796
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2501496127</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2501496127</sourcerecordid><originalsourceid>FETCH-LOGICAL-c145t-90c0f711afd841a9c9e1de3a9e44674cef6c257cff353c1472afee3a4a74b63f3</originalsourceid><addsrcrecordid>eNotkM1OwzAQhC0EEqEgXiESB06B3fgPH1FFS6UiONCzZZw1pJSk2Ckob49Re5qR9tvZ1TB2iXCDKOQtF2C0UUesQCl1pbnAY1YAV1ABBzhlZymtAaAWqArGV90PtZu2ey-HDyqfxjRQHMs-lIsuu46G8sX5zyyzPv662GTynJ0Et0l0cdAJW80eXqeP1fJ5vpjeLyuf_xgqAx6CRnShuRPojDeEDXFnSAilhaegfC21D4FLnld07QLluXBavCke-IRd7XO3sf_eURrsut_FLp-0tQQURmGtM3W9p3zsU4oU7Da2Xy6OFsH-N2IPjfA_I0ZRhA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2501496127</pqid></control><display><type>article</type><title>Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation</title><source>ACM Digital Library Complete</source><creator>Bu, Kai ; Laird, Avery ; Yang, Yutian ; Cheng, Linfeng ; Luo, Jiaqing ; Li, Yingjiu ; Ren, Kui</creator><creatorcontrib>Bu, Kai ; Laird, Avery ; Yang, Yutian ; Cheng, Linfeng ; Luo, Jiaqing ; Li, Yingjiu ; Ren, Kui</creatorcontrib><description>Validating the network paths taken by packets is critical in constructing a secure Internet architecture. Any feasible solution must both enforce packet forwarding along end-host specified paths and verify whether packets have taken those paths. However, the current Internet supports neither enforcement nor verification. Likely due to the radical changes to the Internet architecture and a long-standing confusion between routing and forwarding, only limited solutions for path validation exist in the literature. This survey article aims to reinvigorate research on the essential topic of path validation by crystallizing not only how path validation works but also where seemingly qualified solutions fall short. The analyses explore future research directions in path validation aimed at improving security, privacy, and efficiency.</description><identifier>ISSN: 0360-0300</identifier><identifier>EISSN: 1557-7341</identifier><identifier>DOI: 10.1145/3409796</identifier><language>eng</language><publisher>Baltimore: Association for Computing Machinery</publisher><subject>Computer architecture ; Computer science ; Internet</subject><ispartof>ACM computing surveys, 2021-09, Vol.53 (5), p.1-34</ispartof><rights>Copyright Association for Computing Machinery Oct 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c145t-90c0f711afd841a9c9e1de3a9e44674cef6c257cff353c1472afee3a4a74b63f3</cites><orcidid>0000-0003-1188-801X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Bu, Kai</creatorcontrib><creatorcontrib>Laird, Avery</creatorcontrib><creatorcontrib>Yang, Yutian</creatorcontrib><creatorcontrib>Cheng, Linfeng</creatorcontrib><creatorcontrib>Luo, Jiaqing</creatorcontrib><creatorcontrib>Li, Yingjiu</creatorcontrib><creatorcontrib>Ren, Kui</creatorcontrib><title>Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation</title><title>ACM computing surveys</title><description>Validating the network paths taken by packets is critical in constructing a secure Internet architecture. Any feasible solution must both enforce packet forwarding along end-host specified paths and verify whether packets have taken those paths. However, the current Internet supports neither enforcement nor verification. Likely due to the radical changes to the Internet architecture and a long-standing confusion between routing and forwarding, only limited solutions for path validation exist in the literature. This survey article aims to reinvigorate research on the essential topic of path validation by crystallizing not only how path validation works but also where seemingly qualified solutions fall short. The analyses explore future research directions in path validation aimed at improving security, privacy, and efficiency.</description><subject>Computer architecture</subject><subject>Computer science</subject><subject>Internet</subject><issn>0360-0300</issn><issn>1557-7341</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNotkM1OwzAQhC0EEqEgXiESB06B3fgPH1FFS6UiONCzZZw1pJSk2Ckob49Re5qR9tvZ1TB2iXCDKOQtF2C0UUesQCl1pbnAY1YAV1ABBzhlZymtAaAWqArGV90PtZu2ey-HDyqfxjRQHMs-lIsuu46G8sX5zyyzPv662GTynJ0Et0l0cdAJW80eXqeP1fJ5vpjeLyuf_xgqAx6CRnShuRPojDeEDXFnSAilhaegfC21D4FLnld07QLluXBavCke-IRd7XO3sf_eURrsut_FLp-0tQQURmGtM3W9p3zsU4oU7Da2Xy6OFsH-N2IPjfA_I0ZRhA</recordid><startdate>20210930</startdate><enddate>20210930</enddate><creator>Bu, Kai</creator><creator>Laird, Avery</creator><creator>Yang, Yutian</creator><creator>Cheng, Linfeng</creator><creator>Luo, Jiaqing</creator><creator>Li, Yingjiu</creator><creator>Ren, Kui</creator><general>Association for Computing Machinery</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0003-1188-801X</orcidid></search><sort><creationdate>20210930</creationdate><title>Unveiling the Mystery of Internet Packet Forwarding</title><author>Bu, Kai ; Laird, Avery ; Yang, Yutian ; Cheng, Linfeng ; Luo, Jiaqing ; Li, Yingjiu ; Ren, Kui</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c145t-90c0f711afd841a9c9e1de3a9e44674cef6c257cff353c1472afee3a4a74b63f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Computer architecture</topic><topic>Computer science</topic><topic>Internet</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bu, Kai</creatorcontrib><creatorcontrib>Laird, Avery</creatorcontrib><creatorcontrib>Yang, Yutian</creatorcontrib><creatorcontrib>Cheng, Linfeng</creatorcontrib><creatorcontrib>Luo, Jiaqing</creatorcontrib><creatorcontrib>Li, Yingjiu</creatorcontrib><creatorcontrib>Ren, Kui</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>ACM computing surveys</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bu, Kai</au><au>Laird, Avery</au><au>Yang, Yutian</au><au>Cheng, Linfeng</au><au>Luo, Jiaqing</au><au>Li, Yingjiu</au><au>Ren, Kui</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation</atitle><jtitle>ACM computing surveys</jtitle><date>2021-09-30</date><risdate>2021</risdate><volume>53</volume><issue>5</issue><spage>1</spage><epage>34</epage><pages>1-34</pages><issn>0360-0300</issn><eissn>1557-7341</eissn><abstract>Validating the network paths taken by packets is critical in constructing a secure Internet architecture. Any feasible solution must both enforce packet forwarding along end-host specified paths and verify whether packets have taken those paths. However, the current Internet supports neither enforcement nor verification. Likely due to the radical changes to the Internet architecture and a long-standing confusion between routing and forwarding, only limited solutions for path validation exist in the literature. This survey article aims to reinvigorate research on the essential topic of path validation by crystallizing not only how path validation works but also where seemingly qualified solutions fall short. The analyses explore future research directions in path validation aimed at improving security, privacy, and efficiency.</abstract><cop>Baltimore</cop><pub>Association for Computing Machinery</pub><doi>10.1145/3409796</doi><tpages>34</tpages><orcidid>https://orcid.org/0000-0003-1188-801X</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0360-0300
ispartof ACM computing surveys, 2021-09, Vol.53 (5), p.1-34
issn 0360-0300
1557-7341
language eng
recordid cdi_proquest_journals_2501496127
source ACM Digital Library Complete
subjects Computer architecture
Computer science
Internet
title Unveiling the Mystery of Internet Packet Forwarding: A Survey of Network Path Validation
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T09%3A41%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Unveiling%20the%20Mystery%20of%20Internet%20Packet%20Forwarding:%20A%20Survey%20of%20Network%20Path%20Validation&rft.jtitle=ACM%20computing%20surveys&rft.au=Bu,%20Kai&rft.date=2021-09-30&rft.volume=53&rft.issue=5&rft.spage=1&rft.epage=34&rft.pages=1-34&rft.issn=0360-0300&rft.eissn=1557-7341&rft_id=info:doi/10.1145/3409796&rft_dat=%3Cproquest_cross%3E2501496127%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2501496127&rft_id=info:pmid/&rfr_iscdi=true