Secure the Internet, one home at a time

Kuai Xu, Feng Wang, Xiaohua Jia

Research output: Contribution to journalArticle

5 Citations (Scopus)

Abstract

The rapid growth of residential broadband connections and Internet-enabled home devices have driven the success of many useful applications such as video streaming and remote healthcare. However, poorly managed routers and connected devices in the home are vulnerable under persistent threats and exploitations from cyber attackers across the Internet who continuously identify, compromise, and control devices as part of botnets for launching click fraud, denial of service attacks, spam campaigns. These growing threats and broad damages have made it imperative to understand, characterize, filter, and reduce exploit traffic towards millions of home routers and billions of connected devices in the home. This paper presents a bloom-filter based analytics framework to capture persistent threats towards the same home routers and to identify correlated attacks towards distributed home networks. Our experimental results based on network traffic collected from real homes over 18months have revealed a number of interesting findings on persistent and correlated threats towards home networks, which calls for improved security and management of home networks. To the best of our knowledge, this paper is the first effort to characterize cyber threats towards home networks and to propose a simple and yet effective approach to identify persistent and aggressive attacks towards home networks.

Original languageEnglish (US)
JournalSecurity and Communication Networks
DOIs
StateAccepted/In press - 2016

Fingerprint

Home networks
Internet
Routers
Video streaming
Launching

Keywords

  • Cyber threats
  • Home network security
  • Traffic analysis

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Information Systems

Cite this

Secure the Internet, one home at a time. / Xu, Kuai; Wang, Feng; Jia, Xiaohua.

In: Security and Communication Networks, 2016.

Research output: Contribution to journalArticle

@article{0735d62463da4f97ac56950f42a1bf6e,
title = "Secure the Internet, one home at a time",
abstract = "The rapid growth of residential broadband connections and Internet-enabled home devices have driven the success of many useful applications such as video streaming and remote healthcare. However, poorly managed routers and connected devices in the home are vulnerable under persistent threats and exploitations from cyber attackers across the Internet who continuously identify, compromise, and control devices as part of botnets for launching click fraud, denial of service attacks, spam campaigns. These growing threats and broad damages have made it imperative to understand, characterize, filter, and reduce exploit traffic towards millions of home routers and billions of connected devices in the home. This paper presents a bloom-filter based analytics framework to capture persistent threats towards the same home routers and to identify correlated attacks towards distributed home networks. Our experimental results based on network traffic collected from real homes over 18months have revealed a number of interesting findings on persistent and correlated threats towards home networks, which calls for improved security and management of home networks. To the best of our knowledge, this paper is the first effort to characterize cyber threats towards home networks and to propose a simple and yet effective approach to identify persistent and aggressive attacks towards home networks.",
keywords = "Cyber threats, Home network security, Traffic analysis",
author = "Kuai Xu and Feng Wang and Xiaohua Jia",
year = "2016",
doi = "10.1002/sec.1569",
language = "English (US)",
journal = "Security and Communication Networks",
issn = "1939-0122",
publisher = "John Wiley and Sons Inc.",

}

TY - JOUR

T1 - Secure the Internet, one home at a time

AU - Xu, Kuai

AU - Wang, Feng

AU - Jia, Xiaohua

PY - 2016

Y1 - 2016

N2 - The rapid growth of residential broadband connections and Internet-enabled home devices have driven the success of many useful applications such as video streaming and remote healthcare. However, poorly managed routers and connected devices in the home are vulnerable under persistent threats and exploitations from cyber attackers across the Internet who continuously identify, compromise, and control devices as part of botnets for launching click fraud, denial of service attacks, spam campaigns. These growing threats and broad damages have made it imperative to understand, characterize, filter, and reduce exploit traffic towards millions of home routers and billions of connected devices in the home. This paper presents a bloom-filter based analytics framework to capture persistent threats towards the same home routers and to identify correlated attacks towards distributed home networks. Our experimental results based on network traffic collected from real homes over 18months have revealed a number of interesting findings on persistent and correlated threats towards home networks, which calls for improved security and management of home networks. To the best of our knowledge, this paper is the first effort to characterize cyber threats towards home networks and to propose a simple and yet effective approach to identify persistent and aggressive attacks towards home networks.

AB - The rapid growth of residential broadband connections and Internet-enabled home devices have driven the success of many useful applications such as video streaming and remote healthcare. However, poorly managed routers and connected devices in the home are vulnerable under persistent threats and exploitations from cyber attackers across the Internet who continuously identify, compromise, and control devices as part of botnets for launching click fraud, denial of service attacks, spam campaigns. These growing threats and broad damages have made it imperative to understand, characterize, filter, and reduce exploit traffic towards millions of home routers and billions of connected devices in the home. This paper presents a bloom-filter based analytics framework to capture persistent threats towards the same home routers and to identify correlated attacks towards distributed home networks. Our experimental results based on network traffic collected from real homes over 18months have revealed a number of interesting findings on persistent and correlated threats towards home networks, which calls for improved security and management of home networks. To the best of our knowledge, this paper is the first effort to characterize cyber threats towards home networks and to propose a simple and yet effective approach to identify persistent and aggressive attacks towards home networks.

KW - Cyber threats

KW - Home network security

KW - Traffic analysis

UR - http://www.scopus.com/inward/record.url?scp=84978766073&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84978766073&partnerID=8YFLogxK

U2 - 10.1002/sec.1569

DO - 10.1002/sec.1569

M3 - Article

AN - SCOPUS:84978766073

JO - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0122

ER -