An Internet Architecture Based on the Principle of Least Privilege

نویسندگان

  • Vincent Liu
  • Seungyeop Han
  • Adam Lerner
  • Arvind Krishnamurthy
  • Thomas Anderson
چکیده

In this paper, we present a novel interdomain network architecture that is based on the application of the principle of least privilege. By applying this design principle from the ground up, we can reduce the scope for a large range of misbehaviors (both unintentional and intentional), including configuration errors, DoS attacks, malicious behavior by ISPs, traffic discrimination, and censorship. We present a complete architecture that considers the control plane, name translation mechanisms and even business models. Our objective in this paper is to show that such a system is possible and what it takes to make it work. We show that in our system, users can trade off performance and privacy, with very little performance penalty for users who do not need additional security.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intrusion Tolerance and Worm Spread

We show how the Dependable Intrusion Tolerance (DIT) server architecture prevents the effects and propagation of some common Internet viruses and worms. This results from complementary detection and prevention mechanisms that provide defensive depth, and the application of the principle of least privilege at the network level, including the use of signature-based IDS to enforce higher-level spe...

متن کامل

An Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks

Recently, it is widespread for malware to collect sensitive information owned by third-party applications as well as to escalate its privilege to the system level (the highest level) on the Android platform. An attack of obtaining root-level privilege in an Android environment can form a serious threat to users from the viewpoint of breaking down the whole security system. This paper proposes a...

متن کامل

Specifying and enforcing the principle of least privilege in role-based access control

The principle of least privilege in role-based access control (RBAC) is an important area of research. There are two crucial issues related to it: the specification and the enforcement. We believe that existing least privilege specification schemes are not comprehensive enough and few of the enforcement methods are likely to scale well. In this paper, we formally define the basic principle of l...

متن کامل

Implementing privilege separation in the Condor system

In this paper we discuss, in some depth, our restricted implementation of privilege separation for the Condor system ([1], [2]) (in the Linux environment), and, in addition, we describe our proposed architecture for communication between privilege separated daemons in the Condor system. This architecture, if adopted, would allow each daemon to conform to principle of least privilege, thus signi...

متن کامل

DELDroid: An Automated Approach for Determination and Enforcement of Least-Privilege Architecture in Android

Android is widely used for the development and deployment of autonomous and smart systems, including software targeted for IoT and mobile devices. Security of such systems is an increasingly important concern. Android relies on a permission model to secure the system’s resources and apps. In Android, since the permissions are granted at the granularity of apps, and all components in an app inhe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014