TY - GEN
T1 - Outsourcing home network security
AU - Feamster, Nick
PY - 2010
Y1 - 2010
N2 - The growth of home and small enterprise networks brings with it a large number of devices and networks that are either managed poorly or not at all. Hosts on these networks may become compromised and become sources of spam, denial-of-service traffic, or the site of a scam or phishing attack site. Although a typical user now knows how to apply software updates and run anti-virus software, these techniques still require user vigilance, and they offer no recourse when a machine ultimately becomes compromised. Rather than having individual networks managed independently, we propose to outsource the management and operation of these networks to a third party that has both operations expertise and a broader view of network activity. Our approach harnesses two trends: (1) the advent of programmable network switches, which offer flexibility and the possibility for remote management; and (2) the increasing application of distributed network monitoring and inference algorithms to network security problems (an appealing technique because of its ability to reveal coordinated behavior that may represent an attack).
AB - The growth of home and small enterprise networks brings with it a large number of devices and networks that are either managed poorly or not at all. Hosts on these networks may become compromised and become sources of spam, denial-of-service traffic, or the site of a scam or phishing attack site. Although a typical user now knows how to apply software updates and run anti-virus software, these techniques still require user vigilance, and they offer no recourse when a machine ultimately becomes compromised. Rather than having individual networks managed independently, we propose to outsource the management and operation of these networks to a third party that has both operations expertise and a broader view of network activity. Our approach harnesses two trends: (1) the advent of programmable network switches, which offer flexibility and the possibility for remote management; and (2) the increasing application of distributed network monitoring and inference algorithms to network security problems (an appealing technique because of its ability to reveal coordinated behavior that may represent an attack).
KW - home networking
KW - network security
KW - programmable networking
UR - http://www.scopus.com/inward/record.url?scp=78549295623&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78549295623&partnerID=8YFLogxK
U2 - 10.1145/1851307.1851317
DO - 10.1145/1851307.1851317
M3 - Conference contribution
AN - SCOPUS:78549295623
SN - 9781450301985
T3 - Proceedings of the 2010 ACM SIGCOMM Workshop on Home Networks, HomeNets '10, Co-located with SIGCOMM 2010
SP - 37
EP - 42
BT - Proceedings of the 2010 ACM SIGCOMM Workshop on Home Networks, HomeNets '10, Co-located with SIGCOMM 2010
T2 - 2010 ACM SIGCOMM Workshop on Home Networks, HomeNets '10, Co-located with SIGCOMM 2010
Y2 - 3 September 2010 through 3 September 2010
ER -