skip to main content
10.1145/1099435.1099479acmconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
Article

Security in the residential network

Published:06 November 2005Publication History

ABSTRACT

Since the widespread outbreak of Internet worms in fall 2003, residential institutions have been scrambling to provide better security and management approaches for their residence hall networks. This study looks at some of the common and unique problems confronting residence hall network (ResNet) managers, particularly in smaller institutions, and presents potential and recommended solutions.

References

  1. Andress, M. & Thayer, R. (2005, June 27). Keeping your endpoints in line. Network World, 22 (25), 74.Google ScholarGoogle Scholar
  2. Bailes, J. & Templeton, G. (2004, September). Managing P2P security. Communications of the ACM, 47(9), 95. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Boyd, J. (2000, December 11). College IT managers face the music. InternetWeek, (841).Google ScholarGoogle Scholar
  4. Cisco Systems. (2005). Cisco Clean Access introduction. Retrieved March 3, 2005 from http://www.cisco.com/en/US/products/ps6128/Google ScholarGoogle Scholar
  5. Cox, K. & Gerg, C. (2004) Managing security with Snort and IDS tools. O'Reilly Media, Inc. Sebastapol, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dyck, T. (2003, March 31). When too many rights make a wrong. eWeek, 20(13), 45.Google ScholarGoogle Scholar
  7. Gonsalves, A. (2005). Security flaw found in Trillian IM client. InternetWeek.com. Retrieved March 25, 2005 from http://www.internetweek.com/allStories/showArticle.jhtml?articleID=159906251Google ScholarGoogle Scholar
  8. Honeynet Project & Research Alliance. (2005). Know your enemy: tracking botnets. Retrieved March 13, 2005 from http://www.honeynet.org/papers/bots/Google ScholarGoogle Scholar
  9. Luker, M. (2004, January/February). Security: progress and challenges. Educause Review, 39(1), 60.Google ScholarGoogle Scholar
  10. Merillat, E. (2004). Gaming in ResNet. The ResNet Symposium 2004. Multimedia archive retrieved February 26, 2005 from http://www.resnetsymposium.org/2004princeton.htmGoogle ScholarGoogle Scholar
  11. NetReg.org. (2003) NetReg overview. Retrieved March 20, 2005 from http://www.netreg.org/Google ScholarGoogle Scholar
  12. People barrier's sub-group issue paper. (2000). Electronic Commerce Conference: Defense Reform - On the Road to Excellence. Retrieved March 20, 2005 from Interoperability Clearinghouse, Federal E-Commerce Coalition Working Group Reports, DoD/FECC White Papers: http://www.ichnet.org/FECC/dod/barriers.docGoogle ScholarGoogle Scholar
  13. SANS Institute. (2004). The twenty most critical Internet security vulnerabilities (Updated) The experts' consensus. Retrieved March 12, 2005 from http://www.sans.org/top20/Google ScholarGoogle Scholar
  14. Teo, E. (2004). HoneyNet diary 03 September 2004. Retrieved March 12, 2005 from http://iwfc.security.org.sg/viewdiary.php?diary=20040903Google ScholarGoogle Scholar
  15. Whitehats, Inc. (2001). IDS162 "PING-NMAP-ICMP". Retrieved March 29, 2005 from http://www.whitehats.com/cgi/arachNIDS/Show?_id=ids162&view=eventGoogle ScholarGoogle Scholar
  16. Wilson, M & Hash, J. (No date). Information technology security awareness, training, education, and certification. Retrieved March 20, 2005 from http://www.itl.nist.gov/lab/bulletns/bltnoct03.htmGoogle ScholarGoogle Scholar
  17. Zone Labs LLC. (2005). Retrieved March 10, 2005 from http://www.zonelabs.com/store/content/home.jspGoogle ScholarGoogle Scholar

Index Terms

  1. Security in the residential network

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGUCCS '05: Proceedings of the 33rd annual ACM SIGUCCS conference on User services
        November 2005
        482 pages
        ISBN:1595932003
        DOI:10.1145/1099435

        Copyright © 2005 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 6 November 2005

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate123of170submissions,72%
      • Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader