Abstract
Securing and managing home networks has recently become an increasingly challenging task due to the rapid growth of devices, applications and traffic in these networks. This paper presents a novel object-oriented big data security analytics for making sense of traffic data collection from home networks. We extract the source IP addresses from unwanted traffic towards real home networks as objects of interest, and subsequently characterize these objects with heterogeneous and streaming data sources including intrusion detection logs provided from distributed firewalls, Internet routing table snapshots from BGP routers, active probing results from open DNS resolver scanning, and IP-to-geographical mapping database. Our preliminary results have revealed a number of important findings and correlations on the objects of interests from these diverse and massive data-sets. To the best of our knowledge, this position paper is the first effort to introduce object-oriented perspective to perform security analytics on home network traffic.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anand, A., Gember, A., Akella, A., Sekar, V.: Tracking Semantic Relationships for Effective Data Management in Home Networks. In: Proceedings of ACM SIGCOMM Workshop on Home Networks, HomeNets (September 2010)
Cardenas, A., Manadhata, P., Rajan, S.: Big Data Analytics for Security. IEEE Security & Privacy 11, 74–76 (2013)
Cuzzocrea, A., Sacc, D., Ullman, J.: Big data: a research agenda. In: Proceedings of International Database Engineering and Applications Symposium, IDEAS (October 2013)
Bellovin, S.M.: Distributed Firewalls. Login: Special Issue on Security, 37–39 (November 1999)
Dixon, C., Mahajan, R., Agarwal, S., Brush, A., Lee, B., Saroiu, S., Bahl, V.: The Home Needs an Operating System (and an App Store). In: Proceedings of ACM Workshop on Hot Topics in Networks, HotNets (October 2010)
McGregor, C.: Big Data in Neonatal Intensive Care. Computer 46, 54–59 (2013)
DShield.org: Cooperative Network Security Community - Internet Security, http://www.dshield.org/
Wustrow, E., Karir, M., Bailey, M., Jahanian, F., Houston, G.: Internet Background Radiation Revisited. In: Proceedings of ACM SIGCOMM Conference on Internet Measurement (November 2010)
Feamster, N.: Outsourcing Home Network Security. In: Proceedings of ACM SIGCOMM Workshop on Home Networks (HomeNets) (September 2010)
Maier, G., Feldmann, A., Paxson, V., Allman, M.: On Dominant Characteristics of Residential Broadband Internet Traffic. In: Proceedings of Internet Measurement Conference (November 2009)
Hussain, A., Heidemann, J., Papadopoulos, C.: A Framework for Classifying Denial of Service Attacks. In: Proceedings of ACM SIGCOMM (August 2003)
Heidemann, J., Pradkin, Y., Govindan, R., Papadopoulos, C., Bartlett, G., Bannister, J.: Census and Survey of the Visible Internet. In: Proceedings of ACM Internet Measurement Conference (October 2008)
Calvert, K., Edwards, W.K., Feamster, N., Grinter, R.E., Deng, Y., Zhou, X.: Instrumenting Home Networks. In: Proceedings of ACM SIGCOMM Workshop on Home Networks (HomeNets) (September 2010)
Xu, K., Wang, F., Gu, L., Gao, J., Jin, Y.: Characterizing Home Network Traffic: An Inside View. In: Proceedings of International Conference on Wireless Algorithms, Systems, and Applications (August 2012)
Xu, K., Wang, F., Gu, L., Gao, J., Jin, Y.: Characterizing Home Network Traffic: An Inside View. Accepted by Personal and Ubiquitous Computing 18(4), 967–975 (2014)
Xu, K., Gu, L., Wang, F.: Monitoring Home Network Traffic via Programmable Routers. In: Proceedings of IEEE GLOBECOM (December 2013)
DiCioccio, L., Teixeira, R., Rosenberg, C.: Measuring and Characterizing Home Networks. In: Proceedings of ACM SIGMETRICS (June 2012)
DiCioccio, L., Teixeira, R., Rosenberg, C.: Measuring home networks with homeNet profiler. In: Roughan, M., Chang, R. (eds.) PAM 2013. LNCS, vol. 7799, pp. 176–186. Springer, Heidelberg (2013)
Chen, M., Mao, S., Liu, Y.: Big Data: A Survey. Mobile Networks and Applications (January 2014)
Open Resolver Project: Open DNS Resolvers, http://openresolverproject.org/
Katti, S., Krishnamurthy, B., Katabi, D.: Collaborating Against Common Enemies. In: Proceedings of ACM SIGCOMM Internet Measurement Conference (October 2005)
Denning, T., Kohno, T., Levy, H.M.: Computer Security and the Modern Home. Communications of the ACM 56(1), 94–103 (2013)
University of Oregon: Route Views Project, http://www.routeviews.org/
Yegneswaran, V., Barford, P., Ullrich, J.: Internet intrusions: global characteristics and prevalence. In: Proceedings of ACM SIGMETRICS (June 2003)
Edwards, W., Grinter, R., Mahajan, R., Wetherall, D.: Advancing the State of Home Networking. Communications of the ACM 54(6), 62–71 (June 2011)
Tan, W., Blake, M., Saleh, I., Dustdar, S.: Social-Network-Sourced Big Data Analytics. IEEE Internet Computing 17, 62–69 (2013)
Cai, X., Heidemann, J.: Understanding Block-level Address Usage in the Visible Internet. In: Proceedings of ACM SIGCOMM (August 2010)
Yiakoumis, Y., Yap, K., Katti, S., Parulkar, G., McKeown, N.: Slicing Home Networks. In: Proceedings of ACM SIGCOMM Workshop on Home Networking (August 2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Xu, K., Wang, F., Egli, R., Fives, A., Howell, R., Mcintyre, O. (2014). Object-Oriented Big Data Security Analytics: A Case Study on Home Network Traffic. In: Cai, Z., Wang, C., Cheng, S., Wang, H., Gao, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2014. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://doi.org/10.1007/978-3-319-07782-6_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-07782-6_29
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-07781-9
Online ISBN: 978-3-319-07782-6
eBook Packages: Computer ScienceComputer Science (R0)