N. Shenoy, P. Willis
Rochester Institute of Technology, United States
Keywords: Secure Communications, Secure Services, Bypass Internet, Bypass Layer 3 Security ThreatsThe Internet Protocol (IP) at Layer 3 of our Internet carries heavy traffic from billions of sources. Open nature of IP allows for easy infiltration and attacks. Layer 3 security is an add-on through other implementations and protocols. Our innovative Expedited Internet Bypass Lane (EIBL) protocol, when deployed in routers, will provide a bypass path for traffic between networks and end systems. The bypass path is established below Layer 3, and does not use Layer 3 routing tables. Thus, the EIBL protocol completely decouples sensitive communications and traffic from Layer 3. Bypassing IP, bypasses security threats at Layer 3 and speeds up communications as the heavy traffic at Layer 3 is avoided. In terms of security, the solution is far superior to current secure protocols and implementations, as it avoids traffic handling at Layer 3. The EIBL protocol accomplishes the tasks of the IP and routing protocols as it does not require route discovery. A prototype of the EIBL protocol was evaluated against IP and OSPF, BGP over the Global Environment for Network Innovations (GENI) testbeds. The extremely low convergence times, impact ratio and routing table sizes would provide a fast and secure defense communications network.