[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/986655.986673acmconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
Article

Securing nomads: the case for quarantine, examination, and decontamination

Published: 13 August 2003 Publication History

Abstract

The rapid growth and increasing pervasiveness of wireless networks raises serious security concerns. Client devices will migrate between numerous diverse wireless environments, bringing with them software vulnerabilities and possibly malicious code. Techniques are needed to protect wireless client devices and the next generation wireless infrastructure. We propose QED, a new security model for wireless networks that enables wireless environments to quarantine devices and then analyze and potentially update or "decontaminate" client nodes. The QED paradigm is presented here, as well as the design of a practical prototype.

References

[1]
J. Balasubramaniyan, J. Garcia-Fernandez, E. Spafford, D. Zamboni. An Architecture for Intrusion Detection using Autonomous Agents., COAST Technical Report 98/05, 1998.
[2]
Extensible Authentication Protocol - RFC 2284 - http://www.ietf, org/internet-drafts/draft-ietf-eap-rfc2284bis-01.txt
[3]
Y, Hu, A. Perrig, D. Johnson Ariadne: A secure on-demand routing protocol for ad hoc networks. The 8th ACM International Conference on Mobile Computing and Networking, MobiCom 2002.
[4]
Iptables : http://www.netfilter.org/
[5]
Peter G. Neumann, Phillip A. Porras, Experience with EMERALD To Date. First USENIX Workshop on Intrusion Detection and Network Monitoring, April 1999
[6]
Nam Nguyen, Peter Reiher, Geoff Kuenning, Detecting Insider Threats by Monitoring System Call Activity. Submitted to 4th Annual IEEE Information Assurance, West Point, New York, Mar 2003.
[7]
Nmap Network Mapper. http://www.insecure.org/nmap/
[8]
The Open Group's Common Data SecurityArchitecture(CDSA). http://www.opengroup.org/security/12-cdsa.htm
[9]
Paul Roberts. Hackers find way to exploit latest Microsoft hole. IDG News Service, Sept. 16, 2003. http://www.infoworld.com/article/03/09/16/HNhackers_l.html
[10]
Steven R. Snapp et al. DIDS (Distributed Intrusion Detection System) -Motivation, Architecture, and An Early Prototype. Proc. 14th National Computer Security Conference. Washington, DC, Oct. 1991, pp. 167176.
[11]
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, D. Zerkle. GrIDS - A Graph Based Intrusion Detection System for Large Networks, in Proc. of the 19th National Information Systems Security Conference. Baltimore, MD, Oct. 1996, 361--370.
[12]
The Trusted Computing Platform Alliance http://www.trustedpc.org
[13]
W. Venema, W. and D. Farmer. Improving the Security of Your Site by Breaking Into It. 1993 Internet White paper. http://gd.tuwien.ac.at/infosys/security/wietse-archive/admin-guide-to-cracking. 101.Z

Cited By

View all
  • (2019)Worm damage minimization in enterprise networksInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2006.09.00165:1(3-16)Online publication date: 1-Jan-2019
  • (2008)Information protection via environmental data tethersProceedings of the 2007 Workshop on New Security Paradigms10.1145/1600176.1600188(67-73)Online publication date: 15-Jul-2008
  • (2008)Noninvasive Methods for Host CertificationACM Transactions on Information and System Security10.1145/1341731.134173711:3(1-23)Online publication date: 1-Mar-2008
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
NSPW '03: Proceedings of the 2003 workshop on New security paradigms
August 2003
127 pages
ISBN:1581138806
DOI:10.1145/986655
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 August 2003

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. decontamination
  2. examination
  3. mobile computing
  4. nomadic computing
  5. pervasive computing
  6. quarantine
  7. security
  8. ubiquitous computing
  9. wireless
  10. worm

Qualifiers

  • Article

Conference

NSPW03
Sponsor:
NSPW03: New Security Paradigms and Workshop
August 18 - 21, 2003
Ascona, Switzerland

Acceptance Rates

Overall Acceptance Rate 98 of 265 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2019)Worm damage minimization in enterprise networksInternational Journal of Human-Computer Studies10.1016/j.ijhcs.2006.09.00165:1(3-16)Online publication date: 1-Jan-2019
  • (2008)Information protection via environmental data tethersProceedings of the 2007 Workshop on New Security Paradigms10.1145/1600176.1600188(67-73)Online publication date: 15-Jul-2008
  • (2008)Noninvasive Methods for Host CertificationACM Transactions on Information and System Security10.1145/1341731.134173711:3(1-23)Online publication date: 1-Mar-2008
  • (2006)Non-Invasive Methods for Host Certification2006 Securecomm and Workshops10.1109/SECCOMW.2006.359539(1-10)Online publication date: Aug-2006
  • (2006)A framework for ensuring security in ubiquitous computing environment based on security engineering approachProceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part I10.1007/11892960_150(1250-1258)Online publication date: 9-Oct-2006
  • (2005)Mobile ContagionProceedings of the 19th Workshop on Principles of Advanced and Distributed Simulation10.1109/PADS.2005.14(80-87)Online publication date: 1-Jun-2005
  • (2005)Key factors influencing worm infection in enterprise networksProceedings of the 6th international conference on Information Security Applications10.1007/11604938_5(54-67)Online publication date: 22-Aug-2005

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media