Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Noah Apthorpe is active.

Publication


Featured researches published by Noah Apthorpe.


ieee symposium on security and privacy | 2018

Machine Learning DDoS Detection for Consumer Internet of Things Devices

Rohan Doshi; Noah Apthorpe; Nick Feamster

An increasing number of Internet of Things (IoT) devices are connecting to the Internet, yet many of these devices are fundamentally insecure, exposing the Internet to a variety of attacks. Botnets such as Mirai have used insecure consumer IoT devices to conduct distributed denial of service (DDoS) attacks on critical Internet infrastructure. This motivates the development of new techniques to automatically detect consumer IoT attack traffic. In this paper, we demonstrate that using IoT-specific network behaviors (e.g., limited number of endpoints and regular time intervals between packets) to inform feature selection can result in high accuracy DDoS detection in IoT network traffic with a variety of machine learning algorithms, including neural networks. These results indicate that home gateway routers or other network middleboxes could automatically detect local IoT device sources of DDoS attacks using low-cost machine learning algorithms and traffic data that is flow-based and protocol-agnostic.


the internet of things | 2017

Cleartext Data Transmissions in Consumer IoT Medical Devices

Daniel Wood; Noah Apthorpe; Nick Feamster

This paper introduces a method to capture network traffic from medical IoT devices and automatically detect cleartext information that may reveal sensitive medical conditions and behaviors. The research follows a three-step approach involving traffic collection, cleartext detection, and metadata analysis. We analyze four popular consumer medical IoT devices, including one smart medical device that leaks sensitive health information in cleartext. We also present a traffic capture and analysis system that seamlessly integrates with a home network and offers a user-friendly interface for consumers to monitor and visualize data transmissions of IoT devices in their homes.


2016 IEEE NetSoft Conference and Workshops (NetSoft) | 2016

Treating software-defined networks like disk arrays

Zhiyuan Teo; Kenneth P. Birman; Noah Apthorpe; Robbert van Renesse; Vasily Kuksenkov

Data networks require a high degree of performance and reliability as mission-critical IoT deployments increasingly depend on them. Although performance and fault tolerance can be individually addressed at all levels of the networking stack, few solutions tackle these challenges in an elegant and scalable manner. We propose a redundant array of independent network links (RAIL), adapted from RAID, that combines software-defined networking, disjoint network paths and selective packet processing to improve communications bandwidth and latency while simultaneously providing fault tolerance. Our work shows that the implementation of such a system is feasible without necessitating awareness or changes in the operating systems or hardware of IoT and client devices.


acm special interest group on data communication | 2018

A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation

Trisha Datta; Noah Apthorpe; Nick Feamster

The number and variety of Internet-connected devices have grown enormously in the past few years, presenting new challenges to security and privacy. Research has shown that network adversaries can use traffic rate metadata from consumer IoT devices to infer sensitive user activities. Shaping traffic flows to fit distributions independent of user activities can protect privacy, but this approach has seen little adoption due to required developer effort and overhead bandwidth costs. Here, we present a Python library for IoT developers to easily integrate privacy-preserving traffic shaping into their products. The library replaces standard networking functions with versions that automatically obfuscate device traffic patterns through a combination of payload padding, fragmentation, and randomized cover traffic. Our library successfully preserves user privacy and requires approximately 4 KB/s overhead bandwidth for IoT devices with low send rates or high latency tolerances. This overhead is reasonable given normal Internet speeds in American homes and is an improvement on the bandwidth requirements of existing solutions.


IEEE Internet of Things Journal | 2018

Security and Privacy Analyses of Internet of Things Children’s Toys

Gordon Chu; Noah Apthorpe; Nick Feamster

This paper investigates the security and privacy of Internet-connected children’s smart toys through case studies of three commercially available products. We conduct network and application vulnerability analyses of each toy using static and dynamic analysis techniques, including application binary decompilation and network monitoring. We discover several publicly undisclosed vulnerabilities that violate the Children’s Online Privacy Protection Rule as well as the toys’ individual privacy policies. These vulnerabilities, especially security flaws in network communications with first-party servers, are indicative of a disconnect between many Internet of Things toy developers and security and privacy best practices despite increased attention to Internet-connected toy hacking risks.


neural information processing systems | 2016

Automatic Neuron Detection in Calcium Imaging Data Using Convolutional Networks

Noah Apthorpe; Alexander J. Riordan; Robert Aguilar; Jan Homann; Yi Gu; David W. Tank; H. Sebastian Seung


arXiv: Cryptography and Security | 2017

A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traffic.

Noah Apthorpe; Dillon Reisman; Nick Feamster


arXiv: Cryptography and Security | 2017

Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic.

Noah Apthorpe; Dillon Reisman; Srikanth Sundaresan; Arvind Narayanan; Nick Feamster


arXiv: Cryptography and Security | 2017

Closing the Blinds: Four Strategies for Protecting Smart Home Privacy from Network Observers.

Noah Apthorpe; Dillon Reisman; Nick Feamster


arXiv: Human-Computer Interaction | 2018

User Perceptions of Smart Home IoT Privacy.

Serena Zheng; Noah Apthorpe; Marshini Chetty; Nick Feamster

Collaboration


Dive into the Noah Apthorpe's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge