SlideShare a Scribd company logo
1 of 14
Popeye – Fine-grained Network 
Access Control for Mobile 
Users 
Mike Chen, Barbara Hohlt, and Tal Lavian 
{mikechen, hohltb, tlavian}@cs.berkeley.edu 
UC Berkeley 
CS294-1 Mobile Computing and Wireless Networking 
http://www.cs.berkeley.edu/~mikechen/research/popeye.html
Motivation 
 Existing Intranets don’t support mobile user well while 
enforcing network access control 
 option 1: don’t allow visitors to use the network 
 option 2: build a special visitor network that only has Internet 
access (no Intranet) 
 option 3: use SPINACH II, a Linux software router 
 only provides all-or-nothing access control 
 performance bottleneck when scaling to lots of users 
 Existing Intranets don’t support fine-grained protection 
from insiders 
 everyone has the same network-level access privilege and can 
reach all the machines on the Intranet 
 a growing problem as machines on the Intranet can be 
compromised through virus (e.g. 2000/10 Microsoft break in)
Project Goals 
 Fine-grain access control and QoS 
 user-specific and app-specific 
 Easy to manage 
 Policy Manager simplifies policy specification 
 system-wide, group-wide, and user-specific access control and 
QoS policy 
 Modular design 
 support existing authentication servers (e.g. RADIUS, PKI, 
Kerberos) and user profile servers (e.g. LDAP) 
 enable different modules to be managed by different admins 
 Scalable to lots of users 
 access control should impose minimal performance impact 
 Easy to use
Design 
 Authentication Manager and Profile Manager 
 stores the user credentials such as passwords and authenticates users 
 and stores the user profiles 
 Policy Manager 
 stores policies and generates access control rules given a profile 
 system-wide (e.g. no Napster traffic) 
 group-wide (e.g. visitors only get Internet access) 
 user-specific (e.g. Adj gets the best QoS for video conferencing apps) 
 Network Access Manager 
 configures the routers to enforce policies on packets and physical ports 
 e.g. setup packet filtering rules, move users to appropriate VLANs
Profile 
Architecture 
DHCP 
Router 
Java Web Server 
(2) Sign In (3) Authentication 
Popeye Sign In 
Network Access 
Manager 
physical ports 
Policy Manager 
rules 
Auth 
Policy 
User 
Allow 
Deny 
Physical/Wireless Connection 
(4) Grant Lease 
(7) Set rules 
(5) Profile 
(6) Policy 
(1) IP address 
User
Usage Scenario 
 Sign In 
 a mobile user gets an IP address through DHCP, and 
authenticates to the web server 
 Authentication 
 the web server validates the user with the Authentication Server 
and grants a lease to the user 
 records the physical port and the MAC address of the user 
 Authorization 
 the Policy Manager gets the user’s profile and policies to generate 
access rules 
 Access Control 
 the Network Access Manager enforces the access rules
Implementation 
 Nortel Accelar programmable routers with Java support 
 supports up to 384 physical ports 
 to prevent IP/MAC spoofing, each user is required to be directly 
connected to a physical port 
 Java is used to configure the routers to setup the packet filters 
and QoS rules 
 actual packets are routed at wire speed 
 IP packet filtering 
 protocol specific (e.g. HTTP only) 
 IP address specific (e.g. no access to the payroll subnet) 
 VLAN access control 
 give each VLAN different access level (e.g. Intranet vs. Internet) 
 move users to the VLANs with the proper access
Discussion 
 Performance 
 latency of VLAN setup: 2.0 seconds 
 latency/throughput is wire speed: switched 100Mbps 
 Implemented VLAN-based access control 
 current Accelar routers doesn’t support IP filtering 
 Some support for wireless clients 
 MAC spoofing is a problem as WLAN is a shared LAN, and 
anyone can sniff the MAC address 
 Usability 
 web interface is easy to use 
 hack: DHCP lease is set to really short so the client would 
quickly renew its lease once we move it to a new VLAN
Future Work 
 Support wireless clients 
 to support per-user access control and prevent 
MAC spoofing, base stations must ensure that MAC 
address can not be forged (802.11 WEP is not 
adequate) 
 another option is to deploy VPN (e.g. IP-sec), but it 
has significant $$$, performance, and management 
overhead 
 Design (or reuse) a policy language and build an UI for 
the Policy Manager 
 Integrate packet filtering once the routers support it 
through the Java interface 
 Support existing authentication and directory servers 
 Deploy it on the new UCB campus-wide wireless network
The following are extra slides and 
diagrams to be used in our paper.
Berkeley 
eth0 eth1 
eth1:0 
httpd::eth1 
dhcpd::eth1 
tftpd::eth1:0 
serial connection 
Linux 
Server 
Admin Vlan 
Intranet Vlan 
Internet 
Accelar 1100-B 
Router 
Visitor Vlan Internet Vlan 
Figure 2 
Popeye Servlet 
Access Manager 
dhcp-relay
System Architecture 
Profile Server 
Authentication Server 
DHCP Server 
Popeye 
Network 
Access 
Manager 
router ports 
Keep 
alive 
Popeye Http Servlet 
Popeye Sign In 
Rules Manager 
rules 
Deny Keep 
alive 
user 
profile 
Client 
ticket 
heartbeat 
1. Sign In 
2. Authenticate 
3. Authorize 
4. Access Control
Usage Scenario 2 
 Sign In – a mobile client gets an ip address, goes to the 
Popeye web page, and enters name and password 
 Authentication – the Popeye servlet validates the new 
visitor with the Authentication Server 
 Authorization – the Popeye rules manager gets the 
visitor’s profile from the Profile server and generates 
security rules for this visitor 
 Access Control – the Popeye network access manager 
applies the security rules on the visitor’s physical port, 
forks a keep alive thread which listens for heartbeats, and 
periodically evaluates the visitor’s access
Figure 3 
Net to Media Table 
ifIndex 
physAddress 
netAddress 
type 
Arp Table 
ifIndex 
doProxy 
doResp 
Vlan Table 
Id 
Name 
Color 
highPriority 
routingEnable 
ifIndex 
Action 
Result 
stgId 
Type 
portMembers 
activeMembers 
staticMembers 
notAllowToJoin 
protocolId 
subnetAddr 
subnetMask 
agingTime 
macAddress 
rowStatus 
igmpSnoopEnable 
igmpSnoopReportProxyEnable 
igmpSnoopRobustness 
igmpSnoopQueryInterval 
igmpSnoopMRouter 
userDefinedPid 
igmpSnoopActiveMRouterPort 
protocolIds 
igmpSnoopActiveQuerier 
igmpSnoopMRouterExpiration 
igmpSnoopQuerierPort 
Port Table 
Index 
numVlanIds 
vlanIds 
Type 
discardTaggedFrames 
discardUntaggedFrames 
defaultVlanId 
performTagging 
Interfaces Table 
Index 
Descr 
Type 
Mtu 
Speed 
physicalAddress 
adminStatus 
operStatus 
lastChange 
inOctets 
inUcastPkts 
outUcastPkts 
outNUcastPkts 
outDiscards 
outErrors 
outQLen 
specific

More Related Content

What's hot

Ccna new syllabus brochure
Ccna new syllabus brochureCcna new syllabus brochure
Ccna new syllabus brochureZabeel Institute
 
CAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTikCAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTikDobri Boyadzhiev
 
MikroTik Security
MikroTik SecurityMikroTik Security
MikroTik SecurityRofiq Fauzi
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answersccna4discovery
 
Open Audit
Open AuditOpen Audit
Open Auditncspa
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoTFabMinds
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoTDamien Magoni
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat applicationPiyush Rawat
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Servermmoizuddin
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-accessbhanu4ugood1
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi securityrajakhurram
 
Paper review about NAC & SDN
Paper review about NAC & SDNPaper review about NAC & SDN
Paper review about NAC & SDNKyunghee Univ
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Prabhdeep Kaur
 

What's hot (20)

Ccna new syllabus brochure
Ccna new syllabus brochureCcna new syllabus brochure
Ccna new syllabus brochure
 
CAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTikCAPsMANv2 | Wireless APs Controller by MikroTik
CAPsMANv2 | Wireless APs Controller by MikroTik
 
Ieee 802.1 x
Ieee 802.1 xIeee 802.1 x
Ieee 802.1 x
 
MikroTik Security
MikroTik SecurityMikroTik Security
MikroTik Security
 
Ccna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 AnswersCcna 2 Chapter 8 V4.0 Answers
Ccna 2 Chapter 8 V4.0 Answers
 
Open Audit
Open AuditOpen Audit
Open Audit
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
web communication protocols in IoT
web communication protocols in IoTweb communication protocols in IoT
web communication protocols in IoT
 
Application Layer Protocols for the IoT
Application Layer Protocols for the IoTApplication Layer Protocols for the IoT
Application Layer Protocols for the IoT
 
Client server chat application
Client server chat applicationClient server chat application
Client server chat application
 
Network layer
Network layerNetwork layer
Network layer
 
Gateway and firewall
Gateway and firewallGateway and firewall
Gateway and firewall
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
 
Wi fi protected-access
Wi fi protected-accessWi fi protected-access
Wi fi protected-access
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Firewall Essentials
Firewall EssentialsFirewall Essentials
Firewall Essentials
 
Lecture 11 wifi security
Lecture 11 wifi securityLecture 11 wifi security
Lecture 11 wifi security
 
Paper review about NAC & SDN
Paper review about NAC & SDNPaper review about NAC & SDN
Paper review about NAC & SDN
 
Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)Firewallpresentation 100826052003-phpapp02(1)
Firewallpresentation 100826052003-phpapp02(1)
 
Iuwne10 S04 L05
Iuwne10 S04 L05Iuwne10 S04 L05
Iuwne10 S04 L05
 

Viewers also liked

Impact on Society – the Light at the end of the Tunnel
Impact on Society – the Light at the end of the TunnelImpact on Society – the Light at the end of the Tunnel
Impact on Society – the Light at the end of the TunnelTal Lavian Ph.D.
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01Walter Sinchak,
 
Blaze automation projects 2008
Blaze automation projects 2008Blaze automation projects 2008
Blaze automation projects 2008Blaze_Hyd
 
Fine grained two-factor access control for web-based cloud computing services
Fine grained two-factor access control for web-based cloud computing servicesFine grained two-factor access control for web-based cloud computing services
Fine grained two-factor access control for web-based cloud computing servicesShakas Technologies
 
NT320-Final White Paper
NT320-Final White PaperNT320-Final White Paper
NT320-Final White PaperRyan Ellingson
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection pptDasarathi Dash
 
Radiojungle AAA RADIUS introduction
Radiojungle AAA RADIUS introductionRadiojungle AAA RADIUS introduction
Radiojungle AAA RADIUS introductionsmoscato
 

Viewers also liked (8)

Impact on Society – the Light at the end of the Tunnel
Impact on Society – the Light at the end of the TunnelImpact on Society – the Light at the end of the Tunnel
Impact on Society – the Light at the end of the Tunnel
 
managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01managingyouraccesscontrolsystems-130223182036-phpapp01
managingyouraccesscontrolsystems-130223182036-phpapp01
 
Blaze automation projects 2008
Blaze automation projects 2008Blaze automation projects 2008
Blaze automation projects 2008
 
Fine grained two-factor access control for web-based cloud computing services
Fine grained two-factor access control for web-based cloud computing servicesFine grained two-factor access control for web-based cloud computing services
Fine grained two-factor access control for web-based cloud computing services
 
Network Access Protection
Network Access ProtectionNetwork Access Protection
Network Access Protection
 
NT320-Final White Paper
NT320-Final White PaperNT320-Final White Paper
NT320-Final White Paper
 
Network access protection ppt
Network access protection pptNetwork access protection ppt
Network access protection ppt
 
Radiojungle AAA RADIUS introduction
Radiojungle AAA RADIUS introductionRadiojungle AAA RADIUS introduction
Radiojungle AAA RADIUS introduction
 

Similar to Popeye – Fine-grained Network Access Control for Mobile Users

Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Tal Lavian Ph.D.
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.pptSagarBedarkar3
 
write a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxwrite a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxlez31palka
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache), webhostingguy
 
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea webhostingguy
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
Internet of Things - protocols review (MeetUp Wireless & Networks, Poznań 21....
Internet of Things - protocols review (MeetUp Wireless & Networks, Poznań 21....Internet of Things - protocols review (MeetUp Wireless & Networks, Poznań 21....
Internet of Things - protocols review (MeetUp Wireless & Networks, Poznań 21....Marcin Bielak
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network) Netwax Lab
 
Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1Spiceworks
 
Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architecturesparipec
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].pptBachaSirata
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxsaad504633
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Securityamiable_indian
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008ClubHack
 
2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshopKathleen Ludewig Omollo
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private NetworkRajan Kumar
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comphanleson
 

Similar to Popeye – Fine-grained Network Access Control for Mobile Users (20)

Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
 
wireless lan security.ppt
wireless lan security.pptwireless lan security.ppt
wireless lan security.ppt
 
write a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docxwrite a Review about Wired Network Security -Network Security Hardware.docx
write a Review about Wired Network Security -Network Security Hardware.docx
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
Web Server(Apache),
Web Server(Apache), Web Server(Apache),
Web Server(Apache),
 
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
Feb. 9, 2010 ICACT 2010@Phoenix Park, Korea
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
Internet of Things - protocols review (MeetUp Wireless & Networks, Poznań 21....
Internet of Things - protocols review (MeetUp Wireless & Networks, Poznań 21....Internet of Things - protocols review (MeetUp Wireless & Networks, Poznań 21....
Internet of Things - protocols review (MeetUp Wireless & Networks, Poznań 21....
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1Spiceworks IT Boot Camp - Pt. 1
Spiceworks IT Boot Camp - Pt. 1
 
Wi fi security dedicated architectures
Wi fi security dedicated architecturesWi fi security dedicated architectures
Wi fi security dedicated architectures
 
Chapter_Five[1].ppt
Chapter_Five[1].pptChapter_Five[1].ppt
Chapter_Five[1].ppt
 
V P N
V P NV P N
V P N
 
CN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptxCN. Presentation for submitting project term pptx
CN. Presentation for submitting project term pptx
 
Workshop on Wireless Security
Workshop on Wireless SecurityWorkshop on Wireless Security
Workshop on Wireless Security
 
Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008Sheetal - Wirelesss Hacking - ClubHack2008
Sheetal - Wirelesss Hacking - ClubHack2008
 
2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop2015_01 - Networking Session - SPHMMC ICT workshop
2015_01 - Networking Session - SPHMMC ICT workshop
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.comCh11 Hacking Wireless Networks it-slideshares.blogspot.com
Ch11 Hacking Wireless Networks it-slideshares.blogspot.com
 
MTCNA Show.pptx
MTCNA Show.pptxMTCNA Show.pptx
MTCNA Show.pptx
 

More from Tal Lavian Ph.D.

Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Photonic line sharing for high-speed routers
Photonic line sharing for high-speed routersPhotonic line sharing for high-speed routers
Photonic line sharing for high-speed routersTal Lavian Ph.D.
 
Systems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a networkSystems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a networkTal Lavian Ph.D.
 
Systems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menuSystems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menuTal Lavian Ph.D.
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resourcesTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Systems and methods for electronic communications
Systems and methods for electronic communicationsSystems and methods for electronic communications
Systems and methods for electronic communicationsTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...Tal Lavian Ph.D.
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resourcesTal Lavian Ph.D.
 
Method and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkMethod and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkTal Lavian Ph.D.
 
Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Tal Lavian Ph.D.
 
Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...Tal Lavian Ph.D.
 
Reliable rating system and method thereof
Reliable rating system and method thereofReliable rating system and method thereof
Reliable rating system and method thereofTal Lavian Ph.D.
 
Time variant rating system and method thereof
Time variant rating system and method thereofTime variant rating system and method thereof
Time variant rating system and method thereofTal Lavian Ph.D.
 
Systems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menuSystems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menuTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerTal Lavian Ph.D.
 

More from Tal Lavian Ph.D. (20)

Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Photonic line sharing for high-speed routers
Photonic line sharing for high-speed routersPhotonic line sharing for high-speed routers
Photonic line sharing for high-speed routers
 
Systems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a networkSystems and methods to support sharing and exchanging in a network
Systems and methods to support sharing and exchanging in a network
 
Systems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menuSystems and methods for visual presentation and selection of IVR menu
Systems and methods for visual presentation and selection of IVR menu
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resources
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Systems and methods for electronic communications
Systems and methods for electronic communicationsSystems and methods for electronic communications
Systems and methods for electronic communications
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...Radar target detection system for autonomous vehicles with ultra-low phase no...
Radar target detection system for autonomous vehicles with ultra-low phase no...
 
Grid proxy architecture for network resources
Grid proxy architecture for network resourcesGrid proxy architecture for network resources
Grid proxy architecture for network resources
 
Method and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay networkMethod and apparatus for scheduling resources on a switched underlay network
Method and apparatus for scheduling resources on a switched underlay network
 
Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...Dynamic assignment of traffic classes to a priority queue in a packet forward...
Dynamic assignment of traffic classes to a priority queue in a packet forward...
 
Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...Method and apparatus for using a command design pattern to access and configu...
Method and apparatus for using a command design pattern to access and configu...
 
Reliable rating system and method thereof
Reliable rating system and method thereofReliable rating system and method thereof
Reliable rating system and method thereof
 
Time variant rating system and method thereof
Time variant rating system and method thereofTime variant rating system and method thereof
Time variant rating system and method thereof
 
Systems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menuSystems and methods for visual presentation and selection of ivr menu
Systems and methods for visual presentation and selection of ivr menu
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 
Ultra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizerUltra low phase noise frequency synthesizer
Ultra low phase noise frequency synthesizer
 

Recently uploaded

怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证tufbav
 
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxCRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxRishabh332761
 
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证wpkuukw
 
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证wpkuukw
 
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...samsungultra782445
 
Hilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptxHilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptxhiredepot6
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammamahmedjiabur940
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制uodye
 
Mass storage systems presentation operating systems
Mass storage systems presentation operating systemsMass storage systems presentation operating systems
Mass storage systems presentation operating systemsnight1ng4ale
 
Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryoyebolasonuga14
 
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一ougvy
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Priya Reddy
 
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call GirlVashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call GirlPriya Reddy
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理uodye
 
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...gajnagarg
 
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样ayoqf
 

Recently uploaded (20)

怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
怎样办理斯威本科技大学毕业证(SUT毕业证书)成绩单留信认证
 
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptxCRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
CRISIS COMMUNICATION presentation=-Rishabh(11195)-group ppt (4).pptx
 
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
一比一定(购)国立南方理工学院毕业证(Southern毕业证)成绩单学位证
 
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
一比一定(购)坎特伯雷大学毕业证(UC毕业证)成绩单学位证
 
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
Abortion pills in Jeddah +966572737505 <> buy cytotec <> unwanted kit Saudi A...
 
Hilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptxHilti's Latest Battery - Hire Depot.pptx
Hilti's Latest Battery - Hire Depot.pptx
 
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in DammamAbortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
Abortion Pill for sale in Riyadh ((+918761049707) Get Cytotec in Dammam
 
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
一比一原版(Otago毕业证书)奥塔哥理工学院毕业证成绩单学位证靠谱定制
 
Mass storage systems presentation operating systems
Mass storage systems presentation operating systemsMass storage systems presentation operating systems
Mass storage systems presentation operating systems
 
Point of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratoryPoint of Care Testing in clinical laboratory
Point of Care Testing in clinical laboratory
 
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get CytotecBuy Abortion pills in Riyadh |+966572737505 | Get Cytotec
Buy Abortion pills in Riyadh |+966572737505 | Get Cytotec
 
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ratlam [ 7014168258 ] Call Me For Genuine Models We...
 
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
在线制作(ANU毕业证书)澳大利亚国立大学毕业证成绩单原版一比一
 
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
Mankhurd Call Girls, 09167354423 Mankhurd Escorts Services,Mankhurd Female Es...
 
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call GirlVashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
Vashi Affordable Call Girls ,07506202331,Vasai Virar Charming Call Girl
 
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
一比一维多利亚大学毕业证(victoria毕业证)成绩单学位证如何办理
 
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Udgir [ 7014168258 ] Call Me For Genuine Models We ...
 
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
一比一原版(CSUEB毕业证书)东湾分校毕业证原件一模一样
 
Critical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptxCritical Commentary Social Work Ethics.pptx
Critical Commentary Social Work Ethics.pptx
 
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pillsIn Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
In Riyadh Saudi Arabia |+966572737505 | Buy Cytotec| Get Abortion pills
 

Popeye – Fine-grained Network Access Control for Mobile Users

  • 1. Popeye – Fine-grained Network Access Control for Mobile Users Mike Chen, Barbara Hohlt, and Tal Lavian {mikechen, hohltb, tlavian}@cs.berkeley.edu UC Berkeley CS294-1 Mobile Computing and Wireless Networking http://www.cs.berkeley.edu/~mikechen/research/popeye.html
  • 2. Motivation  Existing Intranets don’t support mobile user well while enforcing network access control  option 1: don’t allow visitors to use the network  option 2: build a special visitor network that only has Internet access (no Intranet)  option 3: use SPINACH II, a Linux software router  only provides all-or-nothing access control  performance bottleneck when scaling to lots of users  Existing Intranets don’t support fine-grained protection from insiders  everyone has the same network-level access privilege and can reach all the machines on the Intranet  a growing problem as machines on the Intranet can be compromised through virus (e.g. 2000/10 Microsoft break in)
  • 3. Project Goals  Fine-grain access control and QoS  user-specific and app-specific  Easy to manage  Policy Manager simplifies policy specification  system-wide, group-wide, and user-specific access control and QoS policy  Modular design  support existing authentication servers (e.g. RADIUS, PKI, Kerberos) and user profile servers (e.g. LDAP)  enable different modules to be managed by different admins  Scalable to lots of users  access control should impose minimal performance impact  Easy to use
  • 4. Design  Authentication Manager and Profile Manager  stores the user credentials such as passwords and authenticates users  and stores the user profiles  Policy Manager  stores policies and generates access control rules given a profile  system-wide (e.g. no Napster traffic)  group-wide (e.g. visitors only get Internet access)  user-specific (e.g. Adj gets the best QoS for video conferencing apps)  Network Access Manager  configures the routers to enforce policies on packets and physical ports  e.g. setup packet filtering rules, move users to appropriate VLANs
  • 5. Profile Architecture DHCP Router Java Web Server (2) Sign In (3) Authentication Popeye Sign In Network Access Manager physical ports Policy Manager rules Auth Policy User Allow Deny Physical/Wireless Connection (4) Grant Lease (7) Set rules (5) Profile (6) Policy (1) IP address User
  • 6. Usage Scenario  Sign In  a mobile user gets an IP address through DHCP, and authenticates to the web server  Authentication  the web server validates the user with the Authentication Server and grants a lease to the user  records the physical port and the MAC address of the user  Authorization  the Policy Manager gets the user’s profile and policies to generate access rules  Access Control  the Network Access Manager enforces the access rules
  • 7. Implementation  Nortel Accelar programmable routers with Java support  supports up to 384 physical ports  to prevent IP/MAC spoofing, each user is required to be directly connected to a physical port  Java is used to configure the routers to setup the packet filters and QoS rules  actual packets are routed at wire speed  IP packet filtering  protocol specific (e.g. HTTP only)  IP address specific (e.g. no access to the payroll subnet)  VLAN access control  give each VLAN different access level (e.g. Intranet vs. Internet)  move users to the VLANs with the proper access
  • 8. Discussion  Performance  latency of VLAN setup: 2.0 seconds  latency/throughput is wire speed: switched 100Mbps  Implemented VLAN-based access control  current Accelar routers doesn’t support IP filtering  Some support for wireless clients  MAC spoofing is a problem as WLAN is a shared LAN, and anyone can sniff the MAC address  Usability  web interface is easy to use  hack: DHCP lease is set to really short so the client would quickly renew its lease once we move it to a new VLAN
  • 9. Future Work  Support wireless clients  to support per-user access control and prevent MAC spoofing, base stations must ensure that MAC address can not be forged (802.11 WEP is not adequate)  another option is to deploy VPN (e.g. IP-sec), but it has significant $$$, performance, and management overhead  Design (or reuse) a policy language and build an UI for the Policy Manager  Integrate packet filtering once the routers support it through the Java interface  Support existing authentication and directory servers  Deploy it on the new UCB campus-wide wireless network
  • 10. The following are extra slides and diagrams to be used in our paper.
  • 11. Berkeley eth0 eth1 eth1:0 httpd::eth1 dhcpd::eth1 tftpd::eth1:0 serial connection Linux Server Admin Vlan Intranet Vlan Internet Accelar 1100-B Router Visitor Vlan Internet Vlan Figure 2 Popeye Servlet Access Manager dhcp-relay
  • 12. System Architecture Profile Server Authentication Server DHCP Server Popeye Network Access Manager router ports Keep alive Popeye Http Servlet Popeye Sign In Rules Manager rules Deny Keep alive user profile Client ticket heartbeat 1. Sign In 2. Authenticate 3. Authorize 4. Access Control
  • 13. Usage Scenario 2  Sign In – a mobile client gets an ip address, goes to the Popeye web page, and enters name and password  Authentication – the Popeye servlet validates the new visitor with the Authentication Server  Authorization – the Popeye rules manager gets the visitor’s profile from the Profile server and generates security rules for this visitor  Access Control – the Popeye network access manager applies the security rules on the visitor’s physical port, forks a keep alive thread which listens for heartbeats, and periodically evaluates the visitor’s access
  • 14. Figure 3 Net to Media Table ifIndex physAddress netAddress type Arp Table ifIndex doProxy doResp Vlan Table Id Name Color highPriority routingEnable ifIndex Action Result stgId Type portMembers activeMembers staticMembers notAllowToJoin protocolId subnetAddr subnetMask agingTime macAddress rowStatus igmpSnoopEnable igmpSnoopReportProxyEnable igmpSnoopRobustness igmpSnoopQueryInterval igmpSnoopMRouter userDefinedPid igmpSnoopActiveMRouterPort protocolIds igmpSnoopActiveQuerier igmpSnoopMRouterExpiration igmpSnoopQuerierPort Port Table Index numVlanIds vlanIds Type discardTaggedFrames discardUntaggedFrames defaultVlanId performTagging Interfaces Table Index Descr Type Mtu Speed physicalAddress adminStatus operStatus lastChange inOctets inUcastPkts outUcastPkts outNUcastPkts outDiscards outErrors outQLen specific