Light at the middle of the tunnel: middleboxes for selective disclosure of network monitoring to distrusted parties

Nik Sultana, Markulf Kohlweiss, Andrew W. Moore

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Network monitoring is vital to the administration and operation of networks, but it requires privileged access that only highly trusted parties are granted. This severely limits the opportunity for external parties, such as service or equipment providers, auditors, or even clients, to measure the health or operation of a network in which they are stakeholders, but do not have access to its internal structure.

In this position paper we propose the use of middleboxes to open up network monitoring to external parties using privacy-preserving technology. This will allow distrusted parties to make more inferences about the network state than currently possible, without learning any precise information about the network or the data that crosses it.

Thus the state of the network will be more transparent to external stakeholders, who will be empowered to verify claims made by network operators. Network operators will be able to provide more information about their network without compromising security or privacy.
Original languageEnglish
Title of host publicationProceedings of the ACM SIGCOMM Workshop on Hot topics in Middleboxes and Network Function Virtualization, HotMiddlebox@SIGCOMM 2016, Florianopolis, Brazil, August, 2016
PublisherACM
Pages1-6
Number of pages6
ISBN (Electronic)978-1-4503-4424-1
DOIs
Publication statusPublished - 22 Aug 2016
EventACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization - Florianopolis, Brazil
Duration: 26 Aug 2016 → …
https://conferences.sigcomm.org/sigcomm/2016/hotmiddlebox.php

Workshop

WorkshopACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization
Abbreviated titleHotMiddlebox 2016
CountryBrazil
CityFlorianopolis
Period26/08/16 → …
Internet address

Fingerprint

Dive into the research topics of 'Light at the middle of the tunnel: middleboxes for selective disclosure of network monitoring to distrusted parties'. Together they form a unique fingerprint.

Cite this