Skip to main content

Object-Oriented Big Data Security Analytics: A Case Study on Home Network Traffic

  • Conference paper
Wireless Algorithms, Systems, and Applications (WASA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8491))

Abstract

Securing and managing home networks has recently become an increasingly challenging task due to the rapid growth of devices, applications and traffic in these networks. This paper presents a novel object-oriented big data security analytics for making sense of traffic data collection from home networks. We extract the source IP addresses from unwanted traffic towards real home networks as objects of interest, and subsequently characterize these objects with heterogeneous and streaming data sources including intrusion detection logs provided from distributed firewalls, Internet routing table snapshots from BGP routers, active probing results from open DNS resolver scanning, and IP-to-geographical mapping database. Our preliminary results have revealed a number of important findings and correlations on the objects of interests from these diverse and massive data-sets. To the best of our knowledge, this position paper is the first effort to introduce object-oriented perspective to perform security analytics on home network traffic.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anand, A., Gember, A., Akella, A., Sekar, V.: Tracking Semantic Relationships for Effective Data Management in Home Networks. In: Proceedings of ACM SIGCOMM Workshop on Home Networks, HomeNets (September 2010)

    Google Scholar 

  2. Cardenas, A., Manadhata, P., Rajan, S.: Big Data Analytics for Security. IEEE Security & Privacy 11, 74–76 (2013)

    Article  Google Scholar 

  3. Cuzzocrea, A., Sacc, D., Ullman, J.: Big data: a research agenda. In: Proceedings of International Database Engineering and Applications Symposium, IDEAS (October 2013)

    Google Scholar 

  4. Bellovin, S.M.: Distributed Firewalls. Login: Special Issue on Security, 37–39 (November 1999)

    Google Scholar 

  5. Dixon, C., Mahajan, R., Agarwal, S., Brush, A., Lee, B., Saroiu, S., Bahl, V.: The Home Needs an Operating System (and an App Store). In: Proceedings of ACM Workshop on Hot Topics in Networks, HotNets (October 2010)

    Google Scholar 

  6. McGregor, C.: Big Data in Neonatal Intensive Care. Computer 46, 54–59 (2013)

    Article  Google Scholar 

  7. DShield.org: Cooperative Network Security Community - Internet Security, http://www.dshield.org/

  8. Wustrow, E., Karir, M., Bailey, M., Jahanian, F., Houston, G.: Internet Background Radiation Revisited. In: Proceedings of ACM SIGCOMM Conference on Internet Measurement (November 2010)

    Google Scholar 

  9. Feamster, N.: Outsourcing Home Network Security. In: Proceedings of ACM SIGCOMM Workshop on Home Networks (HomeNets) (September 2010)

    Google Scholar 

  10. Maier, G., Feldmann, A., Paxson, V., Allman, M.: On Dominant Characteristics of Residential Broadband Internet Traffic. In: Proceedings of Internet Measurement Conference (November 2009)

    Google Scholar 

  11. Hussain, A., Heidemann, J., Papadopoulos, C.: A Framework for Classifying Denial of Service Attacks. In: Proceedings of ACM SIGCOMM (August 2003)

    Google Scholar 

  12. Heidemann, J., Pradkin, Y., Govindan, R., Papadopoulos, C., Bartlett, G., Bannister, J.: Census and Survey of the Visible Internet. In: Proceedings of ACM Internet Measurement Conference (October 2008)

    Google Scholar 

  13. Calvert, K., Edwards, W.K., Feamster, N., Grinter, R.E., Deng, Y., Zhou, X.: Instrumenting Home Networks. In: Proceedings of ACM SIGCOMM Workshop on Home Networks (HomeNets) (September 2010)

    Google Scholar 

  14. Xu, K., Wang, F., Gu, L., Gao, J., Jin, Y.: Characterizing Home Network Traffic: An Inside View. In: Proceedings of International Conference on Wireless Algorithms, Systems, and Applications (August 2012)

    Google Scholar 

  15. Xu, K., Wang, F., Gu, L., Gao, J., Jin, Y.: Characterizing Home Network Traffic: An Inside View. Accepted by Personal and Ubiquitous Computing 18(4), 967–975 (2014)

    Article  Google Scholar 

  16. Xu, K., Gu, L., Wang, F.: Monitoring Home Network Traffic via Programmable Routers. In: Proceedings of IEEE GLOBECOM (December 2013)

    Google Scholar 

  17. DiCioccio, L., Teixeira, R., Rosenberg, C.: Measuring and Characterizing Home Networks. In: Proceedings of ACM SIGMETRICS (June 2012)

    Google Scholar 

  18. DiCioccio, L., Teixeira, R., Rosenberg, C.: Measuring home networks with homeNet profiler. In: Roughan, M., Chang, R. (eds.) PAM 2013. LNCS, vol. 7799, pp. 176–186. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  19. Chen, M., Mao, S., Liu, Y.: Big Data: A Survey. Mobile Networks and Applications (January 2014)

    Google Scholar 

  20. Open Resolver Project: Open DNS Resolvers, http://openresolverproject.org/

  21. Katti, S., Krishnamurthy, B., Katabi, D.: Collaborating Against Common Enemies. In: Proceedings of ACM SIGCOMM Internet Measurement Conference (October 2005)

    Google Scholar 

  22. Denning, T., Kohno, T., Levy, H.M.: Computer Security and the Modern Home. Communications of the ACM 56(1), 94–103 (2013)

    Article  Google Scholar 

  23. University of Oregon: Route Views Project, http://www.routeviews.org/

  24. Yegneswaran, V., Barford, P., Ullrich, J.: Internet intrusions: global characteristics and prevalence. In: Proceedings of ACM SIGMETRICS (June 2003)

    Google Scholar 

  25. Edwards, W., Grinter, R., Mahajan, R., Wetherall, D.: Advancing the State of Home Networking. Communications of the ACM 54(6), 62–71 (June 2011)

    Google Scholar 

  26. Tan, W., Blake, M., Saleh, I., Dustdar, S.: Social-Network-Sourced Big Data Analytics. IEEE Internet Computing 17, 62–69 (2013)

    Article  Google Scholar 

  27. Cai, X., Heidemann, J.: Understanding Block-level Address Usage in the Visible Internet. In: Proceedings of ACM SIGCOMM (August 2010)

    Google Scholar 

  28. Yiakoumis, Y., Yap, K., Katti, S., Parulkar, G., McKeown, N.: Slicing Home Networks. In: Proceedings of ACM SIGCOMM Workshop on Home Networking (August 2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Xu, K., Wang, F., Egli, R., Fives, A., Howell, R., Mcintyre, O. (2014). Object-Oriented Big Data Security Analytics: A Case Study on Home Network Traffic. In: Cai, Z., Wang, C., Cheng, S., Wang, H., Gao, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2014. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://doi.org/10.1007/978-3-319-07782-6_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07782-6_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07781-9

  • Online ISBN: 978-3-319-07782-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics