Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1851307.1851317acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
panel
Free access

Outsourcing home network security

Published: 03 September 2010 Publication History

Abstract

The growth of home and small enterprise networks brings with it a large number of devices and networks that are either managed poorly or not at all. Hosts on these networks may become compromised and become sources of spam, denial-of-service traffic, or the site of a scam or phishing attack site. Although a typical user now knows how to apply software updates and run anti-virus software, these techniques still require user vigilance, and they offer no recourse when a machine ultimately becomes compromised. Rather than having individual networks managed independently, we propose to outsource the management and operation of these networks to a third party that has both operations expertise and a broader view of network activity. Our approach harnesses two trends: (1) the advent of programmable network switches, which offer flexibility and the possibility for remote management; and (2) the increasing application of distributed network monitoring and inference algorithms to network security problems (an appealing technique because of its ability to reveal coordinated behavior that may represent an attack).

References

[1]
NOX Box. http://noxrepo.org/manual/noxbox.html.
[2]
OpenFlow Specification v0.8.2. http://yuba.stanford.edu/openflow/documents/openflow-spec-v0.8.2.pdf.
[3]
SEPIA: Aggregation of Network Measurements Using Multiparty Computation. In Passive & Active Measurement (PAM), Zurich, Switzerland, Apr. 2010.
[4]
M. Allman, E. Blanton, V. Paxson, and S. Shenker. Fighting Coordinated Attackers with Cross-Organizational Information Sharing. In Proc. 5th ACM Workshop on Hot Topics in Networks (Hotnets-V), Irvine, CA, Nov. 2006.
[5]
M. Allman, C. Kreibich, V. Paxson, R. Sommer, and N. Weaver. Principles for Developing Comprehensive Network Visibility. In Proc. 3rd Usenix Workshop on Hot Topics in Security (HotSec), San Jose, CA, July 2008.
[6]
M. Bailey, E. Cooke, F. Jahanian, N. Provos, K. Rosaen, and D. Watson. Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. In Proc. ACM SIGCOMM Internet Measurement Conference, New Orleans, LA, Oct. 2005.
[7]
R. Beverly and K. Sollins. Exploiting the Transport-Level Characteristics of Spam. In 5th Conference on Email and Anti-Spam (CEAS), Mountain View, CA, July 2008.
[8]
Chris Kanich and Christian Kreibich and Kirill Levchenko and Brandon Enright and Vern Paxson and Geoffrey M. Voelker and Stefan Savage,. Spamalytics: an Empirical Analysis of Spam Marketing Conversion. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Arlington, VA, Oct. 2008.
[9]
R. Clayton. spamHINTS: Happily It's Not The Same. http://www.spamhints.org/, 2007.
[10]
Cloudmark Authority Anti-Spam. http://www.cloudmark.com/serviceproviders/authority/spam/.
[11]
E. Cooke, F. Jahanian, and D. McPherson. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In 1st USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), Cambridge, MA, July 2005.
[12]
E. Damiani, S. de Vimercati, and P. Samarati. P2P-Based Collaborative Spam Detection and Filtering. In 4th IEEE Conference on P2P, 2004.
[13]
L. H. Gomes, F. D. O. Castro, R. B. Almeida, L. M. A. Bettencourt, V. A. F. Almeida, and J. M. Almeida. Improving Spam Detection Based on Structural Similarity. In Proc. SRUTI Workshop, Cambridge, MA, July 2005.
[14]
G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection. In Proc. 17th USENIX Security Symposium, Vancouver, BC, Canada, Aug. 2008.
[15]
S. Hao, N. Syed, N. Feamster, A. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In Proc. 18th USENIX Security Symposium, Montreal, Quebec, Canada, Aug. 2009.
[16]
S. Hershkop. Behavior-based Email Analysis with Application to Spam Detection. PhD thesis, Columbia University, 2006.
[17]
Y. Huang, N. Feamster, A. Lakhina, and J. Xu. Exposing routing problems with network-wide analysis. Technical report, Georgia Tech, May 2006. Number forthcoming. Available upon request.
[18]
IronPort Carrier Grade Email Security Appliance. http://www.ironport.com/products/ironport_x1000.html, 2007.
[19]
L. Johansen, M. Rowell, K. Butler, and P. McDaniel. Email Communities of Interest. In 4th Conference on Email and Anti-Spam (CEAS), Mountain View, CA, July 2007.
[20]
S. Katti, B. Krishnamurthy, and D. Katabi. Collaborating Against Common Enemies. In Proc. ACM SIGCOMM Internet Measurement Conference, New Orleans, LA, Oct. 2005.
[21]
Z. Kerravala. Configuration management delivers resiliency. Technical report, The Yankee Group, Nov. 2002.
[22]
J. Kong et al. Scalable and Reliabile Collaborative Spam Filters: Harnessing the Global Socail Email Networks. In 3rd Annual Workshop on the Weblogging Ecosystem, 2006.
[23]
A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E. D. Kolaczyk, and N. Taft. Structural analysis of network traffic flows. In Proc. ACM SIGMETRICS, pages 61--72, New York, NY, June 2004.
[24]
H. Lam and D. Yeung. A learning approach to spam detection based on social networks. In 4th Conference on Email and Anti-Spam (CEAS), Mountain View, CA, July 2007.
[25]
OpenFlow Switch Consortium. http://www.openflowswitch.org/, 2008.
[26]
A. Pathak, Y. C. Hu, and Z. M. Mao. Peeking into Spammer Behavior from a Unique Vantage Point. In Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, Apr. 2008.
[27]
R. Perdisci, W. Lee, and N. Feamster. Behavioral Clustering of HTTP-Based Malware. In Proc. 7th USENIX NSDI, San Jose, CA, Apr. 2010.
[28]
V. Prakash. Vipul's Razor. http://razor.sourceforge.net/, 2007.
[29]
Pyzor. http://pyzor.sourceforge.net/.
[30]
A. Ramachandran, D. Dagon, and N. Feamster. Can DNSBLs Keep Up with Bots? In 3rd Conference on Email and Anti-Spam (CEAS), Mountain View, CA, July 2006.
[31]
A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In Proc. ACM SIGCOMM, Pisa, Italy, Aug. 2006. An earlier version appeared as Georgia Tech TR GT-CSS-2006-001.
[32]
A. Ramachandran, N. Feamster, and S. Vempala. Filtering spam with behavioral blacklisting. In Proc. 14th ACM Conference on Computer and Communications Security, Alexandria, VA, Oct. 2007.
[33]
Secure Computing IronMail. http://www.securecomputing.com/index.cfm?skey=1612, 2007.
[34]
SpamCop. http://www.spamcop.net/.
[35]
Spamhaus, 2006. http://www.spamhaus.org/.
[36]
S. J. Stolfo, S. Hershkop, C.-W. Hu, W.-J. Li, O. Nimeskern, and K. Wang. Behavior-based modeling and its application to Email analysis. 6(2):187--221, May 2006.
[37]
P. Vixie. Distributed Checksum Clearinghouse. http://www.rhyolite.com/anti-spam/dcc/.
[38]
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming bots: Signatures and characteristics. In Proc. ACM SIGCOMM, Seattle, WA, Aug. 2008.
[39]
Y. Xie, F. Yu, K. Achan, E. Gilum, M. Goldszmidt, and T. Wobber. How dynamic are IP addresses. In Proc. ACM SIGCOMM, Kyoto, Japan, Aug. 2007.

Cited By

View all
  • (2024)Survey on Unified Threat Management (UTM) Systems for Home NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2024.338247026:4(2459-2509)Online publication date: Dec-2025
  • (2024)Identification and Operationalization of Key Risks and Mitigations for the Cybersecurity Risk Management of Home Users2024 Cyber Awareness and Research Symposium (CARS)10.1109/CARS61786.2024.10778868(1-9)Online publication date: 28-Oct-2024
  • (2023)CREBAS: Enabling Network Access Control in a Home with One ClickJournal of Information Processing10.2197/ipsjjip.31.17431(174-184)Online publication date: 2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
HomeNets '10: Proceedings of the 2010 ACM SIGCOMM workshop on Home networks
September 2010
70 pages
ISBN:9781450301985
DOI:10.1145/1851307
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 September 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. home networking
  2. network security
  3. programmable networking

Qualifiers

  • Panel

Conference

SIGCOMM '10
Sponsor:
SIGCOMM '10: ACM SIGCOMM 2010 Conference
September 3, 2010
New Delhi, India

Acceptance Rates

Overall Acceptance Rate 12 of 26 submissions, 46%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)152
  • Downloads (Last 6 weeks)22
Reflects downloads up to 06 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Survey on Unified Threat Management (UTM) Systems for Home NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2024.338247026:4(2459-2509)Online publication date: Dec-2025
  • (2024)Identification and Operationalization of Key Risks and Mitigations for the Cybersecurity Risk Management of Home Users2024 Cyber Awareness and Research Symposium (CARS)10.1109/CARS61786.2024.10778868(1-9)Online publication date: 28-Oct-2024
  • (2023)CREBAS: Enabling Network Access Control in a Home with One ClickJournal of Information Processing10.2197/ipsjjip.31.17431(174-184)Online publication date: 2023
  • (2023)By Your Command: Extracting the User Actions that Create Network Flows in Android2023 14th International Conference on Network of the Future (NoF)10.1109/NoF58724.2023.10302820(118-122)Online publication date: 4-Oct-2023
  • (2022)A Step Towards On-Path Security Function OutsourcingProceedings of the 23rd International Conference on Distributed Computing and Networking10.1145/3491003.3491007(175-187)Online publication date: 4-Jan-2022
  • (2022)Capability Based Network Access Control for Smart Home Devices2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops53856.2022.9767368(551-556)Online publication date: 21-Mar-2022
  • (2021)Automatic Symbol Resolution on Embedded Platforms by the Example of Smart TV DeviceApplied Sciences10.3390/app1108367411:8(3674)Online publication date: 19-Apr-2021
  • (2021)An Identification Algorithm of Attacking Programs based on Quadratic Feature Selection and Fast Decision Tree2021 IEEE 21st International Conference on Software Quality, Reliability and Security Companion (QRS-C)10.1109/QRS-C55045.2021.00028(133-140)Online publication date: Dec-2021
  • (2021)Research Frontiers of Network Behavior AnalysisNetwork Behavior Analysis10.1007/978-981-16-8325-1_8(119-163)Online publication date: 16-Dec-2021
  • (2020)IoT-KEEPER: Detecting Malicious IoT Network Activity Using Online Traffic Analysis at the EdgeIEEE Transactions on Network and Service Management10.1109/TNSM.2020.296695117:1(45-59)Online publication date: Mar-2020
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media