Is Visualization Enough? Evaluating the Efficacy of MUD-Visualizer in Enabling Ease of Deployment for Manufacturer Usage Description (MUD)

被引:3
作者
Andalibi, Vafa [1 ]
Dev, Jayati [1 ]
Kim, DongInn [1 ]
Lear, Eliot [2 ]
Camp, L. Jean [1 ]
机构
[1] Indiana Univ, Bloomington, IN 47405 USA
[2] Cisco Syst GmbH, Zurich, Switzerland
来源
37TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2021 | 2021年
基金
美国国家科学基金会;
关键词
Usable Security; Internet of Things; Network Security; Usable Access Control; IoT; MUD; Manufacturer Usage Description;
D O I
10.1145/3485832.3485879
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The IETF Manufacturer Usage Description (MUD) standard was designed to protect IoT devices through network micro-segmentation. In practice, this is implemented using per-device access control that is defined by the manufacturer. This access control is embedded in a "MUD-File", which is transferred to the user's network during the onboarding process, and may contain from one to hundreds of rules. Validating these rules for each device can be a challenge, particularly when devices are interacting. In response, MUD-Visualizer was designed to simplify the validation of individual and interacting MUD-Files through straightforward visualizations. In this work, we report on an evaluation of the usability and efficacy of MUD-Visualizer. The results illustrate that not only it is more usable compared to manual analysis, but the participants that used MUD-Visualizer also had more accurate results in less time.
引用
收藏
页码:337 / 348
页数:12
相关论文
共 36 条
  • [11] 2-D
  • [12] Cohen J., 1969, STAT POWER ANAL BEHA
  • [13] Coronges K., 2012, 2012 45th Hawaii International Conference on System Sciences (HICSS), P2366, DOI 10.1109/HICSS.2012.657
  • [14] Dodson Donna, 2019, Technical Report
  • [15] Craigslist Scams and Community Composition: Investigating Online Fraud Victimization[J]. Garg, Vaibhav;Nilizadeh, Shirin. IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013
  • [16] Clear as MUD: Generating, Validating and Applying IoT Behavioral Profiles[J]. Hamza, Ayyoob;Ranathunga, Dinesha;Gharakheili, Hassan Habibi;Roughan, Matthew;Sivaraman, Vijay. PROCEEDINGS OF THE 2018 WORKSHOP ON IOT SECURITY AND PRIVACY (IOT S&P '18), 2018
  • [17] Heitzmann A, 2008, LECT NOTES COMPUT SC, V5210, P18, DOI 10.1007/978-3-540-85933-8_2
  • [18] Access control visualization using triangular matrices[J]. Kolomeets, Maxim;Chechulin, Andrey;Kotenko, Igor;Saenko, Igor. 2019 27TH EUROMICRO INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND NETWORK-BASED PROCESSING (PDP), 2019
  • [19] Lear Eliot, 2020, SBOM Extension for MUD
  • [20] Lear Eliot, 2019, RFC 8520, DOI DOI 10.17487/RFC8520