Validating Security Protocols with Cloud-Based Middleboxes

被引:0
|
作者
Taylor, Curtis R. [1 ]
Shue, Craig A. [1 ]
机构
[1] Worcester Polytech Inst, Worcester, MA 01609 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Residential networks pose a unique challenge for security since they are operated by end-users that may not have security expertise. Residential networks are also home to devices that may have lackluster security protections, such as Internet of Things (IoT) devices, which may introduce vulnerabilities. In this work, we introduce TLSDeputy, a middlebox-based system to protect residential networks from connections to inauthentic TLS servers. By combining the approach with OpenFlow, a popular software-defined networking protocol, we show that we can effectively provide residential network-wide protections across diverse devices with minimal performance overheads.
引用
收藏
页码:261 / 269
页数:9
相关论文
共 50 条
  • [1] Cloud-Based Data Architecture Security
    N. A. Semenov
    A. A. Poltavtsev
    [J]. Automatic Control and Computer Sciences, 2019, 53 : 1056 - 1064
  • [2] Cloud-Based Data Architecture Security
    Semenov, N. A.
    Poltavtsev, A. A.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2019, 53 (08) : 1056 - 1064
  • [3] Data Security in Cloud-Based Applications
    Pandey, Surabhi
    Purohit, G. N.
    Munshi, Usha Mujoo
    [J]. DATA SCIENCE LANDSCAPE: TOWARDS RESEARCH STANDARDS AND PROTOCOLS, 2018, 38 : 321 - 326
  • [4] Related Work in Cloud-Based Security
    不详
    [J]. IEEE SECURITY & PRIVACY, 2013, 11 (01) : 45 - 45
  • [5] Cloud-based Buyer-Seller Watermarking Protocols
    Peng, Yi-Jia
    Hsieh, Yung-Chen
    Hsueh, Chih-Wen
    Wu, Ja-Ling
    [J]. 2017 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTED, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI), 2017,
  • [6] Security Automation for Cloud-Based IoT Platforms
    Merzouki, Mheni
    Mahmoudi, Charif
    Bohn, Robert
    Tunc, Cihan
    [J]. 2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2019, : 1185 - 1191
  • [7] Security challenges for cloud-based email infrastructure
    Bhardwaj, Akashdeep
    Goundar, Sam
    [J]. Network Security, 2017, 2017 (11) : 8 - 15
  • [8] SECURITY ASPECTS OF CLOUD-BASED MOBILE LEARNING
    Velev, D. G.
    [J]. FINANCIAL AND CREDIT ACTIVITY-PROBLEMS OF THEORY AND PRACTICE, 2014, 2 (17): : 240 - 251
  • [9] Interface to Network Security Functions for Cloud-Based Security Services
    Hyun, Sangwon
    Kim, Jinyong
    Kim, Hyoungshick
    Jeong, Jaehoon
    Hares, Susan
    Dunbar, Linda
    Farrel, Adrian
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (01) : 171 - 178
  • [10] CBSS: Cloud-Based Security System with Interface to Network Security Functions
    Jeong, Jaehoon
    Lingga, Patrick
    [J]. 2023 FOURTEENTH INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND UBIQUITOUS NETWORK, ICMU, 2023,