skip to main content
10.1145/2645892.2645896acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Per-user policy enforcement on mobile apps through network functions virtualization

Published: 11 September 2014 Publication History

Abstract

Due to the increasing popularity of smartphones and tablets, mobile apps are becoming the preferred portals for users to access various network services in both residential and enterprise environments. Predominantly using generic HTTP or HTTPS protocols, traffic from different mobile apps is largely indistinguishable. This loss of visibility into mobile app traffic brings new challenges to network management and traffic analysis. It has became very hard to implement network policies based on the differentiation between traffic from compliant and non-compliant mobile apps. This paper presents a system that not only provides network administrators the much desired capability of enforcing policies on mobile app traffic, but also does that at a fine per-user granularity. The proposed system takes a Network Functions Virtualization (NFV) approach and virtualizes an edge router into multiple virtual data planes. Specifically, each data plane serves solely to one particular user and consists of user-specific virtualized network functions. The independence of the virtual data planes facilitates enforcing network policies at the per-user level. To enable policy enforcement on mobile apps, our system includes a sophisticated mobile app identification module to recognize traffic from different apps using preloaded traffic signatures. By exploiting TLS proxying, our system can even enforce policies on those mobile apps adopting traffic encryption. We have implemented a prototype of the proposed system as a wireless access point (AP) using a commodity small form factor PC. Our preliminary experimental evaluations show that the system can scale to modest number of users without much impacting user experience in using the network.

References

[1]
hostapd and wpa_supplicant. http://hostap.epitest.fi/.
[2]
I. Cerrato, M. Pramotton, and F. Risso. Moving applications from the host to the network: Experiences, challenges, and findings. In IEEE Workshop on Mobile Cloud Networking (MCN), 2013.
[3]
A. Cortesi. mitmproxy - a man-in-the-middle proxy. http://mitmproxy.org/.
[4]
S. Dai, A. Tongaonkar, X. Wang, A. Nucci, and D. Song. NetworkProfiler: Towards Automatic Fingerprinting of Android Apps. In Proceedings of IEEE INFOCOM, 2013.
[5]
N. Egi and et al. A platform for high performance and flexible virtual routers on commodity hardware. ACM SIGCOMM Computer Communication Review, 2010.
[6]
A. D. Keromytis and J. L. Wright. Transparent network security policy enforcement. In Proceedings of USENIX ATC, 2000.
[7]
K. W. Miller, J. Voas, and G. F. Hurlburt. BYOD: security and privacy considerations. It Professional, 14(5):0053--55, 2012.
[8]
O. Morandi, F. Risso, P. Rolando, S. Valenti, and P. Veglia. Creating portable and efficient packet processing applications. Design Automation for Embedded Systems, 15(1):51--85, 2011.
[9]
B. Morrow. BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12):5--8, 2012.
[10]
M. R. Nascimento, C. E. Rothenberg, M. R. Salvador, C. N. Corrêa, S. C. de Lucena, and M. F. Magalhães. Virtual routers as a service: the routeflow approach leveraging software-defined networks. In Proceedings of the 6th International Conference on Future Internet Technologies, pages 34--37. ACM, 2011.
[11]
F. Risso and I. Cerrato. Customizing data-plane processing in edge routers. In Software Defined Networking (EWSDN), 2012 European Workshop on, pages 114--120. IEEE, 2012.
[12]
R. Sailer, T. Jaeger, X. Zhang, and L. Van Doorn. Attestation-based policy enforcement for remote access. In Proceedings of the 11th ACM conference on Computer and communications security. ACM, 2004.
[13]
Symantec. Internet security threat report 2014. http://www.symantec.com/security_response/publications/threatreport.jsp.
[14]
A. Tongaonkar, S. Dai, A. Nucci, and D. Song. Understanding mobile app usage patterns using in-app advertisements. In Passive and Active Measurement. Springer, 2013.
[15]
Q. Xu, T. Andrews, Y. Liao, S. Miskovic, Z. M. Mao, M. Baldi, and A. Nucci. FLOWR: A Self-Learning System for Classifying Mobile Application Traffic. In Proceedings of ACM SIGMETRICS, 2014.

Cited By

View all

Index Terms

  1. Per-user policy enforcement on mobile apps through network functions virtualization

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MobiArch '14: Proceedings of the 9th ACM workshop on Mobility in the evolving internet architecture
      September 2014
      76 pages
      ISBN:9781450330749
      DOI:10.1145/2645892
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 11 September 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. mobile security
      2. network functions virtualization
      3. policy enforcement
      4. traffic filtering

      Qualifiers

      • Research-article

      Conference

      MobiCom'14
      Sponsor:

      Acceptance Rates

      MobiArch '14 Paper Acceptance Rate 11 of 17 submissions, 65%;
      Overall Acceptance Rate 47 of 92 submissions, 51%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 27 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media