characteristic based security analysis of personal
play

Characteristic-Based Security Analysis of Personal Networks Andrew - PowerPoint PPT Presentation

Characteristic-Based Security Analysis of Personal Networks Andrew Paverd Department of Computer Science University of Oxford Fadi El-Moussa BT Research BT Technology, Service & Operations Ian Brown Oxford Internet Institute University


  1. Characteristic-Based Security Analysis of Personal Networks Andrew Paverd Department of Computer Science University of Oxford Fadi El-Moussa BT Research BT Technology, Service & Operations Ian Brown Oxford Internet Institute University of Oxford https://www.cs.ox.ac.uk/people/andrew.paverd/home

  2. Home Network Security Limitations of previous analyses ● geographically-defined networks – category-based approaches – Focus on Personal Network (PN) ● home network + PAN + VAN + cloud – more representative of current systems – captures emergent characteristics – Characteristic-based approach ● maps device characteristics to attack vectors – more descriptive than category-based approaches – can adapt as technology changes –

  3. The Personal Network Limitations of previous analyses ● geographically-defined networks – category-based approaches – Focus on Personal Network (PN) ● home network + PAN + VAN + cloud – more representative of current systems – captures emergent characteristics – Characteristic-based approach ● maps device characteristics to attack vectors – more descriptive than category-based approaches – can adapt as technology changes –

  4. Characteristic-Based Security Analysis

  5. PN Characteristics Shared components [10] [7] Absence of geographical Multihomed network topology locality [10] [11] [7] [3] Device heterogeneity Dynamic membership [3] [12] [9] [15] Communication diversity Energy-aware systems [3] [10] [15] [14]

  6. Component Physical mobility Characteristics Persistent storage Support for third party software Processing functionality Control of other components Communication Remote accessibility capabilities User interface Provision of services capabilities Control of physical Consumption of services infrastructure

  7. Component Physical mobility HEMS Tablet Characteristics Persistent storage Support for third party software Processing functionality Control of other components Communication Remote accessibility capabilities User interface Provision of services capabilities Control of physical Consumption of services infrastructure

  8. Attack Vectors Malicious software Impersonating a communicating [1][4][7][8][9] entity [3] Malicious hardware Unauthorized remote access [16] [3][7][9] Software exploits Unauthorized physical access [8] [3][7] Hardware exploits Misuse of device interoperability [16] [7] Interception of communication Protocols exploits (eavesdropping) [1][2][3][4] [1] Interruption of communication Eavesdropping on the UI [3][16] (shoulder-surfing) [3] Modification of communication Modification of communication [3] routing [1][3]

  9. Mapping Attacks to Characteristics

  10. Conclusion Limitations of previous analyses ● geographically-defined networks – category-based approaches – Focus on Personal Network (PN) ● home network + PAN + VAN + cloud – more representative of current systems – captures emergent characteristics – Characteristic-based approach ● maps device characteristics to attack vectors – more descriptive than category-based approaches – can adapt as technology changes –

  11. Characteristic-Based Security Analysis of Personal Networks Andrew Paverd Department of Computer Science University of Oxford Fadi El-Moussa BT Research BT Technology, Service & Operations Ian Brown Oxford Internet Institute University of Oxford https://www.cs.ox.ac.uk/people/andrew.paverd/home

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend