A Policy Framework for the Future Internet

This paper is about the Internet’s future, but we begin with its past. The history of network routing began as a topological problem: how does one find the shortest paths in a graph ([11])? However, with the advent of domain-based Internet routing, policy became an important consideration. In fact, policy concerns were embedded in the 1989 requirements document (RFC 1126) that set the groundwork for the first version of BGP:

[1]  David D. Clark,et al.  Tussle in cyberspace: defining tomorrow's Internet , 2002, IEEE/ACM Transactions on Networking.

[2]  Deborah Estrin,et al.  Visa protocols for controlling interorganizational datagram flow , 1989, IEEE J. Sel. Areas Commun..

[3]  Michael Walfish,et al.  Middleboxes No Longer Considered Harmful , 2004, OSDI.

[4]  Stefan Savage,et al.  Fatih: detecting and isolating malicious routers , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[5]  X.. Yang,et al.  NIRA: A New Inter-Domain Routing Architecture , 2007, IEEE/ACM Transactions on Networking.

[6]  Krishna P. Gummadi,et al.  Improving the Reliability of Internet Paths with One-hop Source Routing , 2004, OSDI.

[7]  Pekka Nikander,et al.  Host Identity Protocol (HIP) Architecture , 2006, RFC.

[8]  Mike Little Goals and functional requirements for inter-autonomous system routing , 1989, RFC.

[9]  H. Niedermayer,et al.  Accountable Internet Protocol , 2009 .

[10]  Kai Sorensen,et al.  Federal Information Processing Standards Publication , 1985 .

[11]  Xiaowei Yang,et al.  Source selectable path diversity via routing deflections , 2006, SIGCOMM.

[12]  Radia J. Perlman,et al.  Routing with Byzantine robustness , 2005 .

[13]  Deborah Estrin,et al.  Security issues in policy routing , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[14]  David R. Cheriton,et al.  Loose source routing as a mechanism for traffic policies , 2004, FDNA '04.

[15]  Martín Casado,et al.  Ethane: taking control of the enterprise , 2007, SIGCOMM '07.

[16]  Scott Shenker,et al.  Internet indirection infrastructure , 2004, IEEE/ACM Transactions on Networking.

[17]  Hong Yan,et al.  A clean slate 4D approach to network control and management , 2005, CCRV.

[18]  Saikat Guha,et al.  An end-middle-end approach to connection establishment , 2007, SIGCOMM '07.

[19]  Edsger W. Dijkstra,et al.  A note on two problems in connexion with graphs , 1959, Numerische Mathematik.

[20]  Nick Feamster,et al.  Design and implementation of a routing control platform , 2005, NSDI.

[21]  Argyraki,et al.  Network Capabilities : The Good , the Bad and the Ugly Katerina , 2022 .

[22]  Dawn Xiaodong Song,et al.  SIFF: a stateless Internet flow filter to mitigate DDoS flooding attacks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[23]  Brighten Godfrey,et al.  Pathlet routing , 2009, SIGCOMM '09.

[24]  Ratul Mahajan,et al.  Mutually Controlled Routing with Independent ISPs , 2007, NSDI.

[25]  Xin Liu,et al.  To filter or to authorize: network-layer DoS defense against multimillion-node botnets , 2008, SIGCOMM '08.

[26]  Dawn Xiaodong Song,et al.  StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense , 2006, IEEE Journal on Selected Areas in Communications.

[27]  Hisashi Kobayashi,et al.  Highly secure and efficient routing , 2004, IEEE INFOCOM 2004.

[28]  Shivkumar Kalyanaraman,et al.  BANANAS: an evolutionary framework for explicit and multipath routing in the internet , 2003, FDNA '03.

[29]  Scott Shenker,et al.  A data-oriented (and beyond) network architecture , 2007, SIGCOMM '07.

[30]  Alex C. Snoeren,et al.  A system for authenticated policy-compliant routing , 2004, SIGCOMM '04.

[31]  Josef Stoer,et al.  Numerische Mathematik 1 , 1989 .

[32]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[33]  Jennifer Rexford,et al.  MIRO: multi-path interdomain routing , 2006, SIGCOMM.

[34]  Deborah Estrin,et al.  Source Demand Routing: Packet Format and Forwarding Specification (Version 1) , 1996, RFC.

[35]  U. Austin,et al.  The design and implementation of a policy framework for the future Internet , 2009 .

[36]  Xiaowei Yang,et al.  A DoS-limiting network architecture , 2005, SIGCOMM '05.

[37]  David Mazières,et al.  Separating key management from file system security , 1999, SOSP.