DocumentCode :
2574569
Title :
Non-Invasive Methods for Host Certification
Author :
Traynor, Patrick ; Chien, Michael ; Weaver, Scott ; Hicks, Boniface ; McDaniel, Patrick
Author_Institution :
Dept. of Comput. Sci. & Eng., Pennsylvania State Univ., University Park, PA
fYear :
2006
fDate :
Aug. 28 2006-Sept. 1 2006
Firstpage :
1
Lastpage :
10
Abstract :
Determining whether a user or system is exercising appropriate security practices is difficult in any context. Such difficulties are particularly pronounced when uncontrolled or unknown platforms join public networks. Commonly practiced techniques used to vet these hosts, such as system scans, have the potential to infringe upon the privacy of users. In this paper, we show that it is possible for clients to prove both the presence and proper functioning of security infrastructure without allowing unrestricted access to their system. We demonstrate this approach, specifically applied to anti-virus security, by requiring clients seeking admission to a network to positively identify the presence or absence of malcode in a series of puzzles. The implementation of this mechanism and its application to real networks are also explored. In so doing, we demonstrate that it is not necessary for an administrator to be invasive to determine whether a client implements good security practices
Keywords :
computer networks; computer viruses; anti-virus security; host certification; malcode identification; noninvasive methods; public networks; security infrastructure; system scans; user privacy; Access protocols; Authentication; Best practices; Certification; Computer security; Computer viruses; Detectors; Portable computers; Privacy; Protection; Assurance; Certification; Malware; Network Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Securecomm and Workshops, 2006
Conference_Location :
Baltimore, MD
Print_ISBN :
1-4244-0423-1
Electronic_ISBN :
1-4244-0423-1
Type :
conf
DOI :
10.1109/SECCOMW.2006.359539
Filename :
4198799
Link To Document :
بازگشت