Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
3 results
Search Results
Item Programmable Data Plane for New IP using eXpress Data Path (XDP) in Linux(IEEE Computer Society, 2022) Kataria, B.; Rohit, R.; Monis, L.; Tahiliani, M.P.; Makhijani, K.This paper demonstrates a new dimension in packet programming and processing by leveraging New IP technology since applications are sensitive to different types of network constraints. For instance, emerging industry operations, manufacturing, and autonomics are limited by the stochastic quality of services and inflexible address structures. Instead, they require efficiency and deterministic networks. In this paper, we propose a programmable data plane for New IP packet processing and show how network headers could evolve in the future. We demonstrate the implementation of New IP stack to encompass three goals: (1) address customization: applications and routers can forward packets between hosts with different address formats. (2) design an end-to-end model to meet service delivery guarantees: routers implement various in-network New IP contracts as described by the applications. (3) Rapid experimentation of the New IP components. With New IP, developers can describe packet processing functionalities without depending on the specifics of the underlying hardware. Our implementation of New IP stack uses the existing toolsets and capabilities of the Linux platform, such as eXpress Data Path (XDP) and Traffic Control (TC) subsystem. It consists of an end-to-end solution with a new network stack on the host side and a corresponding packet processing and forwarding engine on the network. It is validated using Network Stack Tester (NeST), a lightweight tool built on Linux network namespaces. © 2022 IEEE.Item Enabling Support for TLS and TLS Fingerprinting in Network Stack Tester(Institute of Electrical and Electronics Engineers Inc., 2024) Dabi, N.; Tahiliani, M.P.; Rathod, V.J.Transport Layer Security (TLS) is the standard protocol widely used for securing client-server communications over the Internet. It ensures the confidentiality and integrity of data transmitted between systems. With the rising deployment of TLS 1.3, which is the latest version of the protocol, stronger encryption and improved security features are introduced. The adoption of TLS 1.3 brings about the need for techniques such as TLS fingerprinting. TLS fingerprinting involves analyzing the unique characteristics of TLS handshakes to identify and classify different implementations or configurations of TLS. However, researchers currently lack a dedicated platform to test TLS and TLS fingerprinting techniques in a controlled environment. To address this gap, we aim to enhance NeST (Network Stack Tester) by adding support for TLS and TLS fingerprinting. NeST is a Python tool for network emulation that internally uses Linux network namespaces and Linux utilities to create virtual testbeds, perform experiments using various network protocols and collect statistics. By integrating TLS and TLS fingerprinting into NeST, we provide an easy-to-use tool that enables researchers to experiment with TLS, analyze TLS traffic, and evaluate the effectiveness of TLS fingerprinting techniques. © 2024 IEEE.Item Design and Development of an Emulation Model for VPN and VPN Bonding(Institute of Electrical and Electronics Engineers Inc., 2024) Sharma, K.; Tahiliani, M.P.; Rathod, V.J.Virtual Private Networks (VPNs) have become indispensable for organizations seeking secure remote network access, with a significant rise in their adoption. While the COVID-19 pandemic initially fueled the surge in remote work and VPN usage, the trend has continued post-pandemic as organizations increasingly opt for hybrid work models. VPNs allow users to establish secure connections to their organization's network from any location, ensuring the confidentiality of transmitted data. Moreover, VPN bonding, which combines multiple VPN connections into a unified interface, improves performance and reliability, particularly in areas with limited Internet connectivity. As the usage of VPN and VPN bonding technologies continues to expand, a growing demand arises for research in this field, and consequently, the need for robust emulators and simulators. However, existing network emulators or simulators currently lack comprehensive support for VPN-related technologies. To address these limitations, this paper aims to develop intuitive and user-friendly Application Programming Interfaces (APIs) for emulating VPN and VPN bonding in Network Stack Tester (NeST), a powerful Python package designed to facilitate network emulation for experienced researchers and individuals new to the field. This work utilizes OpenVPN, a secure tunneling daemon, to integrate the support of VPN emulation in NeST. By augmenting the capabilities of NeST, this work intends to provide researchers with a valuable toolset for exploring and testing VPN and VPN bonding technologies across diverse network environments. © 2024 IEEE.
