Management and Security WG - PowerPoint PPT Presentation

1 / 9
About This Presentation
Title:

Management and Security WG

Description:

Classic security problems technologically solved but deployment lags. DoS is an open problem ... Rest of us say. The world is not so gloomy! ... – PowerPoint PPT presentation

Number of Views:27
Avg rating:3.0/5.0
Slides: 10
Provided by: ResearchM53
Category:

less

Transcript and Presenter's Notes

Title: Management and Security WG


1
Management and Security WG
  • Adya, Hubaux, Qiu, Rao, Simon, Wetherall

2
Outline
  • Problem Space
  • State of the Art
  • Research Challenges

3
Problem Space
  • Security
  • Classic security and privacy issues
  • Confidentiality, integrity, authentication
  • Denial of service
  • Restricting network access
  • Management
  • Accounting, provisioning, configuration
  • Fault diagnosis and repair

4
State of the Art
  • Classic security problems technologically solved
    but deployment lags
  • DoS is an open problem
  • Few or poor management tools
  • Do low-level data collection
  • Do minimal fault diagnosis
  • Much of above applies to wired networks as well

5
Research Challenges
  • Epsilon Management
  • How much can we reduce management?
  • Complete zero management infeasible
  • Incentives require management
  • Accounting, provisioning, configuration
  • E.g., Bootstrapping what should the mesh box do
  • What is the charging model? What accounting data
    to collect?

6
Research Challenges
  • Fault Diagnosis and Repair
  • What kind of faults to analyze?
  • Connectivity why are you disconnected?
  • Performance what is normal behavior?
  • Misconfiguration, broken equipment
  • How do you detect and fix these faults?
  • Tools to detect various fault and recover from
    them
  • How much can the network be self-healing?

7
Research Challenges
  • Incentives for honest participation
  • Getting people to participate
  • Why should someone forward packets?
  • Detecting and punishing greedy behavior
  • Preventing protocol exploitation
  • Environmental tampering
  • Hardware tampering

8
Research Challenges
  • Denial of service
  • Physical attacks unpreventable but local
  • How can you locate the responsible nodes
  • Network attacks
  • How much can you localize DoS attacks?
  • Rationing scarce bandwidth fairly

9
Predictions
  • Dan says
  • Administration and incentive overheads doom
    widespread deployment
  • Rest of us say
  • The world is not so gloomy!
Write a Comment
User Comments (0)
About PowerShow.com