An Internet Architecture Based on the Principle of Least Privilege
نویسندگان
چکیده
In this paper, we present a novel interdomain network architecture that is based on the application of the principle of least privilege. By applying this design principle from the ground up, we can reduce the scope for a large range of misbehaviors (both unintentional and intentional), including configuration errors, DoS attacks, malicious behavior by ISPs, traffic discrimination, and censorship. We present a complete architecture that considers the control plane, name translation mechanisms and even business models. Our objective in this paper is to show that such a system is possible and what it takes to make it work. We show that in our system, users can trade off performance and privacy, with very little performance penalty for users who do not need additional security.
منابع مشابه
Intrusion Tolerance and Worm Spread
We show how the Dependable Intrusion Tolerance (DIT) server architecture prevents the effects and propagation of some common Internet viruses and worms. This results from complementary detection and prevention mechanisms that provide defensive depth, and the application of the principle of least privilege at the network level, including the use of signature-based IDS to enforce higher-level spe...
متن کاملAn Android Security Extension to Protect Personal Information against Illegal Accesses and Privilege Escalation Attacks
Recently, it is widespread for malware to collect sensitive information owned by third-party applications as well as to escalate its privilege to the system level (the highest level) on the Android platform. An attack of obtaining root-level privilege in an Android environment can form a serious threat to users from the viewpoint of breaking down the whole security system. This paper proposes a...
متن کاملSpecifying and enforcing the principle of least privilege in role-based access control
The principle of least privilege in role-based access control (RBAC) is an important area of research. There are two crucial issues related to it: the specification and the enforcement. We believe that existing least privilege specification schemes are not comprehensive enough and few of the enforcement methods are likely to scale well. In this paper, we formally define the basic principle of l...
متن کاملImplementing privilege separation in the Condor system
In this paper we discuss, in some depth, our restricted implementation of privilege separation for the Condor system ([1], [2]) (in the Linux environment), and, in addition, we describe our proposed architecture for communication between privilege separated daemons in the Condor system. This architecture, if adopted, would allow each daemon to conform to principle of least privilege, thus signi...
متن کاملDELDroid: An Automated Approach for Determination and Enforcement of Least-Privilege Architecture in Android
Android is widely used for the development and deployment of autonomous and smart systems, including software targeted for IoT and mobile devices. Security of such systems is an increasingly important concern. Android relies on a permission model to secure the system’s resources and apps. In Android, since the permissions are granted at the granularity of apps, and all components in an app inhe...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014