dc.contributor.advisor | David D. Clark. | en_US |
dc.contributor.author | Fruchter. Nathaniel H. | en_US |
dc.contributor.other | Massachusetts Institute of Technology. Institute for Data, Systems, and Society. | en_US |
dc.contributor.other | Technology and Policy Program. | en_US |
dc.date.accessioned | 2019-11-12T18:13:22Z | |
dc.date.available | 2019-11-12T18:13:22Z | |
dc.date.copyright | 2019 | en_US |
dc.date.issued | 2019 | en_US |
dc.identifier.uri | https://hdl.handle.net/1721.1/122916 | |
dc.description | This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. | en_US |
dc.description | Thesis: S.M. in Technology and Policy, Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program, 2019 | en_US |
dc.description | Cataloged from student-submitted PDF version of thesis. | en_US |
dc.description | Includes bibliographical references (pages 79-85). | en_US |
dc.description.abstract | Security notification schemes hold great promise for improving both consumer cybersecurity and general network health as malware and other sources of malicious activity are becoming more prevalent on home networks. For example, botnets of Internet of Things devices engage in denial of service (DoS) attacks and ransomware holds data on personal and commercial systems hostage. Many of these threats are relatively opaque for an end user. An end user may not know that their smart device is participating in a DoS attack at all, unless they notice a protracted slowdown in network speeds. An upstream network provider like a consumer ISP has more visibility into the issue. Due to their privileged position, ISPs often have more data about the status of a malware infection, denial of service attack, or other malicious activity. This extra information can be of great benefit for the purposes of notification. For instance, an ISP may be able to notify a customer that a device on their network is being used for a DoS attackor that they see communication with a server involved in distributing ransomware. ISPs and other organizations that try and implement these schemes often run into a set of questions: How do I get the right data to power the notification? How do I ensure the user trusts the notification? Can I ensure the notification is not spoofed? Is there an optimal way to present the notification? How do I make sure a user takes the proper remedial action? This thesis presents a framework for new notification schemes to answer these questions by examining four key elements of a notification: form, delivery, and content. It also proposes multi-factor verification, a novel scheme to address trust and spoofing issues within a notification scheme. Finally, it provides a model for a new ISP-user security notification scheme within the context of the United States market and policy landscape. | en_US |
dc.description.statementofresponsibility | by Nathaniel H. Fruchter. | en_US |
dc.format.extent | 85 pages | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Massachusetts Institute of Technology | en_US |
dc.rights | MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. | en_US |
dc.rights.uri | http://dspace.mit.edu/handle/1721.1/7582 | en_US |
dc.subject | Institute for Data, Systems, and Society. | en_US |
dc.subject | Technology and Policy Program. | en_US |
dc.title | Enhancing ISP-consumer security notifications | en_US |
dc.title.alternative | Enhancing Internet Service Provider-consumer security notifications | en_US |
dc.type | Thesis | en_US |
dc.description.degree | S.M. in Technology and Policy | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Institute for Data, Systems, and Society | en_US |
dc.contributor.department | Massachusetts Institute of Technology. Engineering Systems Division | |
dc.contributor.department | Technology and Policy Program | |
dc.identifier.oclc | 1126790910 | en_US |
dc.description.collection | S.M.inTechnologyandPolicy Massachusetts Institute of Technology, School of Engineering, Institute for Data, Systems, and Society, Technology and Policy Program | en_US |
dspace.imported | 2019-11-12T18:13:20Z | en_US |
mit.thesis.degree | Master | en_US |
mit.thesis.department | TPP | en_US |
mit.thesis.department | ESD | en_US |
mit.thesis.department | IDSS | en_US |