20 likes | 204 Views
Behavior Based Access Control. Michael J. Mayhew, Cross Domain Innovation & Science (CDIS) Air Force Research Laboratory (AFRL) 525 Brooks Road, Rome NY, 13441-4505, Email: michael.mayhew@rl.af.mil , Tel: (315) 330-2898. CONTEXT
E N D
Behavior Based Access Control Michael J. Mayhew, Cross Domain Innovation & Science (CDIS) Air Force Research Laboratory (AFRL)525 Brooks Road, Rome NY, 13441-4505, Email: michael.mayhew@rl.af.mil, Tel: (315) 330-2898 • CONTEXT • Analyzing observable information about actors and documents for the purpose of assessing trustworthiness • PROBLEM • No systematic way to determine how recent and unfolding security events impact the trustworthiness of information, its sources, and consumers • Missions operate unaware of impacts posed by latest and evolving events • OBJECTIVE • Provide an enterprise capability for computing actionable trustworthiness of actors, services, and documents over time • BENEFITS • Diminishes the risk of misplaced trust • Increases mission reliability and assurance • Deters abuse of authorized privileges • APPROACH • Synergistic combination of rule-based techniques with statistical learning • Strategic integration with existing access control schemes • Multi-layered analysis to achieve scale and timeliness • TECHNICAL CHALLENGES • At mission speed • At enterprise scale • With high accuracy • STATUS • Initial results on analyzing TCP connections, HTTP requests, and Wikipedia pages at TRL 3 Derive Actionable Trustworthiness of Actors, Services Documents Behavior Low-level Observables NetworkTraces HTTP Requests Provenance Trails Audit Trails This work was sponsored by the Air Force Research Laboratory (AFRL). Distribution A. Approved for public release; distribution unlimited (Case Number 88ABW-2013-1040)
Behavior BasedAccess Control Michael J. Mayhew, Cross Domain Innovation & Science (CDIS) Air Force Research Laboratory (AFRL)525 Brooks Road, Rome NY, 13441-4505, Email: michael.mayhew@rl.af.mil, Tel: (315) 330-2898 • Combine explicit rule-based analysis of behaviors with statistical learning • Capture Subject Matter Expert knowledge • through rules • Learn threshold values and combination • functions over rules • Strategically enhance existing access controls with trust assessments • Refine requests that would have been granted • Guaranteed not to weaken existing access • control policies • Multi-stage Processing Pipeline • Separate heavy duty computations from online • event processing and inline interactions during • access control checks to reduce data volume • through pipeline