{"title":"通过高效的局部部署拓扑配置和验证实现安全研究","authors":"Bashayer Alharbi, K. Olson, Eric Keller","doi":"10.1109/INFOCOMWKSHPS57453.2023.10226052","DOIUrl":null,"url":null,"abstract":"How to measure security value in partial deployments has long been a consideration for the Internet research community. Without clear security outcomes, adoption of security mechanisms may take years before users begin to see any benefit. This lack of clarity can serve to further delay adoption as incentives to implement are often outweighed by additional costs or complexity. While prior efforts have looked at theoretical approaches to estimate this critical mass of partial deployment within a topology, no effort has been able to effectively simulate and measure such an outcome. In this work, we provide an early effort to demonstrate how topology simulation can be used to effectively deploy and measure partial deployments of RPKI utilizing the SEED Internet Emulator. Our efforts show that this approach can be used to simulate large networks and provide an effective means to measure partial deployment value of security protocol deployments. Further, we demonstrate that adoption rates of greater than fifty percent begin to show exponential return on security outcomes for both adopters and non-adopters alike.","PeriodicalId":354290,"journal":{"name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","volume":"163 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enabling Security Research Through Efficient Partial Deployment Topology Configuration and Validation\",\"authors\":\"Bashayer Alharbi, K. Olson, Eric Keller\",\"doi\":\"10.1109/INFOCOMWKSHPS57453.2023.10226052\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"How to measure security value in partial deployments has long been a consideration for the Internet research community. Without clear security outcomes, adoption of security mechanisms may take years before users begin to see any benefit. This lack of clarity can serve to further delay adoption as incentives to implement are often outweighed by additional costs or complexity. While prior efforts have looked at theoretical approaches to estimate this critical mass of partial deployment within a topology, no effort has been able to effectively simulate and measure such an outcome. In this work, we provide an early effort to demonstrate how topology simulation can be used to effectively deploy and measure partial deployments of RPKI utilizing the SEED Internet Emulator. Our efforts show that this approach can be used to simulate large networks and provide an effective means to measure partial deployment value of security protocol deployments. Further, we demonstrate that adoption rates of greater than fifty percent begin to show exponential return on security outcomes for both adopters and non-adopters alike.\",\"PeriodicalId\":354290,\"journal\":{\"name\":\"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"volume\":\"163 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-05-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10226052\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INFOCOMWKSHPS57453.2023.10226052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enabling Security Research Through Efficient Partial Deployment Topology Configuration and Validation
How to measure security value in partial deployments has long been a consideration for the Internet research community. Without clear security outcomes, adoption of security mechanisms may take years before users begin to see any benefit. This lack of clarity can serve to further delay adoption as incentives to implement are often outweighed by additional costs or complexity. While prior efforts have looked at theoretical approaches to estimate this critical mass of partial deployment within a topology, no effort has been able to effectively simulate and measure such an outcome. In this work, we provide an early effort to demonstrate how topology simulation can be used to effectively deploy and measure partial deployments of RPKI utilizing the SEED Internet Emulator. Our efforts show that this approach can be used to simulate large networks and provide an effective means to measure partial deployment value of security protocol deployments. Further, we demonstrate that adoption rates of greater than fifty percent begin to show exponential return on security outcomes for both adopters and non-adopters alike.