Towards SDN-Defined Programmable BYOD (Bring Your Own Device) Security

被引:26
作者
Hong, Sungmin [1 ]
Baykov, Robert [1 ]
Xu, Lei [1 ]
Nadimpalli, Srinath [1 ]
Gu, Guofei [1 ]
机构
[1] Texas A&M Univ, SUCCESS Lab, College Stn, TX 77843 USA
来源
23RD ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2016) | 2016年
关键词
D O I
10.14722/ndss.2016.23458
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An emerging trend in corporate network administration is BYOD (Bring Your Own Device). Although with many advantages, the paradigm shift presents new challenges in security to enterprise networks. While existing solutions such as Mobile Device Management (MDM) focus mainly on controlling and protecting device data, they fall short in providing a holistic network protection system. New innovation is needed in providing administrators with sophisticated network policies and control capabilities over the devices and mobile applications (apps). In this paper, we present PBS (Programmable BYOD Security), a new security solution to enable fine-grained, application-level network security programmability for the purpose of network management and policy enforcement on mobile apps and devices. Our work is motivated by another emerging and powerful concept, SDN (Software-Defined Networking). With a novel abstraction of mobile device elements (e.g., apps and network interfaces on the device) into conventional SDN network elements, PBS intends to provide network-wide, context-aware, app-specific policy enforcement at run-time without introducing much overhead on a resource-constrained mobile device, and without the actual deployment of SDN switches in enterprise networks. We implement a prototype system of PBS, with a controller component that runs a BYOD policy program on existing SDN controllers and a client component, PBS- DROID, for Android devices. Our evaluation shows that PBS is an effective and practical solution for BYOD security.
引用
收藏
页数:15
相关论文
共 20 条
[1]  
[Anonymous], 2010, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, DOI [10.1145/1755688.1755732, DOI 10.1145/1755688.1755732]
[2]  
[Anonymous], 2010, OSDI
[3]  
Chen KevinZhijie., 2013, NDSS
[4]   DevoFlow: Scaling Flow Management for High-Performance Networks [J].
Curtis, Andrew R. ;
Mogul, Jeffrey C. ;
Tourrilhes, Jean ;
Yalagandula, Praveen ;
Sharma, Puneet ;
Banerjee, Sujata .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2011, 41 (04) :254-265
[5]   SPHINX: Detecting Security Attacks in Software-Defined Networks [J].
Dhawan, Mohan ;
Poddar, Rishabh ;
Mahajan, Kshiteej ;
Mann, Vijay .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[6]  
Enck W, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P235
[7]   Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures [J].
Hong, Sungmin ;
Xu, Lei ;
Wang, Haopei ;
Gu, Guofei .
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015), 2015,
[8]  
Kim K, 2012, PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON APAC 2011
[9]  
Lee J. K. Jerry, 2014, Proceedings 2014 IEEE International Test Conference (ITC), DOI 10.1109/TEST.2014.7035278
[10]  
Logicalis, BYOD RES FIND