• DocumentCode
    3127041
  • Title

    Plugging the leaks without unplugging your network in the midst of Disaster

  • Author

    Goldman, Aaron D. ; Uluagac, A. Selcuk ; Beyah, Raheem ; Copeland, J.A.

  • Author_Institution
    Commun. Syst. Center (CSC), Georgia Inst. of Technol., Atlanta, GA, USA
  • fYear
    2012
  • fDate
    22-25 Oct. 2012
  • Firstpage
    248
  • Lastpage
    251
  • Abstract
    Network Disaster Recovery research has examined behavior of networks after disasters with an aim to restoring normal conditions. In addition to probable loss of connectivity, a disaster scenario can also lead to security risks. However, network security has been examined extensively under normal conditions, and not under conditions that ensue after disasters. Therefore, security issues should be addressed during the period of chaos after a disaster, but before operating conditions return to normal. Furthermore, security should be assured, while still allowing access to the network to enable public communication in order to assist in disaster relief efforts. In general, the desire to help with public assistance requires opening up access to the network, while security concerns add pressure to close down or limit access to the network. In this study, we show that the objectives of availability and confidentiality, two objectives that have not previously been considered together in disaster scenarios, can be simultaneously achieved. For our study, we evaluated six wireless devices with various network configurations, including a laptop, a Kindle Fire e-reader, an Android tablet, a Google Nexus phone, an IP camera, and an Apple TV, to approximate behaviors of a communication network under a disaster scenario. Actual data leakage was tracked and observed for these devices. To the best of our knowledge this has not previously been examined in a systematic manner for post-disaster scenarios. After illustrating the data leakage of various devices, we analyze the risk associated with the various types of leakage. Moving private traffic to a VPN would free the physical network for use as a public resource.
  • Keywords
    business continuity; computer network security; mobile computing; telecommunication traffic; Android tablet; Apple TV; Google Nexus phone; IP camera; Kindle Fire e-reader; VPN; connectivity loss; data leakage; disaster relief efforts; laptop; network configurations; network disaster recovery research; network security; post-disaster scenarios; private traffic; public communication; security risks; wireless devices; Google; Internet; Linux; Portable computers; Protocols; Security; Availability; Confidentiality; Data Leakage; Network Disaster Recovery; Post-Disaster Network Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Local Computer Networks (LCN), 2012 IEEE 37th Conference on
  • Conference_Location
    Clearwater, FL
  • ISSN
    0742-1303
  • Print_ISBN
    978-1-4673-1565-4
  • Type

    conf

  • DOI
    10.1109/LCN.2012.6423620
  • Filename
    6423620