Outsourcing home network security

Nick Feamster

Research output: Chapter in Book/Report/Conference proceedingConference contribution

55 Scopus citations

Abstract

The growth of home and small enterprise networks brings with it a large number of devices and networks that are either managed poorly or not at all. Hosts on these networks may become compromised and become sources of spam, denial-of-service traffic, or the site of a scam or phishing attack site. Although a typical user now knows how to apply software updates and run anti-virus software, these techniques still require user vigilance, and they offer no recourse when a machine ultimately becomes compromised. Rather than having individual networks managed independently, we propose to outsource the management and operation of these networks to a third party that has both operations expertise and a broader view of network activity. Our approach harnesses two trends: (1) the advent of programmable network switches, which offer flexibility and the possibility for remote management; and (2) the increasing application of distributed network monitoring and inference algorithms to network security problems (an appealing technique because of its ability to reveal coordinated behavior that may represent an attack).

Original languageEnglish (US)
Title of host publicationProceedings of the 2010 ACM SIGCOMM Workshop on Home Networks, HomeNets '10, Co-located with SIGCOMM 2010
Pages37-42
Number of pages6
DOIs
StatePublished - 2010
Event2010 ACM SIGCOMM Workshop on Home Networks, HomeNets '10, Co-located with SIGCOMM 2010 - New Delhi, India
Duration: Sep 3 2010Sep 3 2010

Publication series

NameProceedings of the 2010 ACM SIGCOMM Workshop on Home Networks, HomeNets '10, Co-located with SIGCOMM 2010

Other

Other2010 ACM SIGCOMM Workshop on Home Networks, HomeNets '10, Co-located with SIGCOMM 2010
CountryIndia
CityNew Delhi
Period9/3/109/3/10

All Science Journal Classification (ASJC) codes

  • Computer Graphics and Computer-Aided Design
  • Computer Networks and Communications

Keywords

  • home networking
  • network security
  • programmable networking

Fingerprint Dive into the research topics of 'Outsourcing home network security'. Together they form a unique fingerprint.

  • Cite this

    Feamster, N. (2010). Outsourcing home network security. In Proceedings of the 2010 ACM SIGCOMM Workshop on Home Networks, HomeNets '10, Co-located with SIGCOMM 2010 (pp. 37-42). (Proceedings of the 2010 ACM SIGCOMM Workshop on Home Networks, HomeNets '10, Co-located with SIGCOMM 2010). https://doi.org/10.1145/1851307.1851317