Skip to main content

Detecting Malicious Middleboxes In Service Function Chaining
draft-park-sfc-malicious-middlebox-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Canh Thang Nguyen , Minho Park
Last updated 2021-06-04 (Latest revision 2020-12-01)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document addresses problems caused by malicious middleboxes and proposes a scheme that can detect them in Service Function Chaining (SFC) by combining two mechanisms: direct and indirect. The direct mechanism injects a tool into the middleboxes to observe and report the state of each middlebox. In contrast, the indirect mechanism creates a probe service chain, which includes trustful middleboxes, to investigate the operation of other middleboxes in the network.

Authors

Canh Thang Nguyen
Minho Park

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)