1 / 2

CONTEXT

Behavior Based Access Control. Michael J. Mayhew, Cross Domain Innovation & Science (CDIS) Air Force Research Laboratory (AFRL) 525 Brooks Road, Rome NY, 13441-4505, Email: michael.mayhew@rl.af.mil , Tel: (315) 330-2898. CONTEXT

ernie
Download Presentation

CONTEXT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Behavior Based Access Control Michael J. Mayhew, Cross Domain Innovation & Science (CDIS) Air Force Research Laboratory (AFRL)525 Brooks Road, Rome NY, 13441-4505, Email: michael.mayhew@rl.af.mil, Tel: (315) 330-2898 • CONTEXT • Analyzing observable information about actors and documents for the purpose of assessing trustworthiness • PROBLEM • No systematic way to determine how recent and unfolding security events impact the trustworthiness of information, its sources, and consumers • Missions operate unaware of impacts posed by latest and evolving events • OBJECTIVE • Provide an enterprise capability for computing actionable trustworthiness of actors, services, and documents over time • BENEFITS • Diminishes the risk of misplaced trust • Increases mission reliability and assurance • Deters abuse of authorized privileges • APPROACH • Synergistic combination of rule-based techniques with statistical learning • Strategic integration with existing access control schemes • Multi-layered analysis to achieve scale and timeliness • TECHNICAL CHALLENGES • At mission speed • At enterprise scale • With high accuracy • STATUS • Initial results on analyzing TCP connections, HTTP requests, and Wikipedia pages at TRL 3 Derive Actionable Trustworthiness of Actors, Services Documents Behavior Low-level Observables NetworkTraces HTTP Requests Provenance Trails Audit Trails This work was sponsored by the Air Force Research Laboratory (AFRL). Distribution A. Approved for public release; distribution unlimited (Case Number 88ABW-2013-1040)

  2. Behavior BasedAccess Control Michael J. Mayhew, Cross Domain Innovation & Science (CDIS) Air Force Research Laboratory (AFRL)525 Brooks Road, Rome NY, 13441-4505, Email: michael.mayhew@rl.af.mil, Tel: (315) 330-2898 • Combine explicit rule-based analysis of behaviors with statistical learning • Capture Subject Matter Expert knowledge • through rules • Learn threshold values and combination • functions over rules • Strategically enhance existing access controls with trust assessments • Refine requests that would have been granted • Guaranteed not to weaken existing access • control policies • Multi-stage Processing Pipeline • Separate heavy duty computations from online • event processing and inline interactions during • access control checks to reduce data volume • through pipeline

More Related