Modeling an Intelligent Continuous Authentication System to Protect Financial Information Resources Thomas G. Calderon Akhilesh Chandra John J. Cheh The.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Lecture 6 User Authentication (cont)
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Detecting Computer Intrusions Using Behavioral Biometrics Ahmed Awad E. A, and Issa Traore University of Victoria PST’05 Oct 13,2005.
Information Security Policies and Standards
6/4/2015National Digital Certification Agency1 Security Engineering and PKI Applications in Modern Enterprises Mohamed HAMDI National.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Introduction to Biometrics Dr. Pushkin Kachroo. New Field Face recognition from computer vision Speaker recognition from signal processing Finger prints.
GUIDE TO BIOMETRICS CHAPTER I & II September 7 th 2005 Presentation by Tamer Uz.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
CSE 4482, 2009 Session 21 Personal Information Protection and Electronic Documents Act Payment Card Industry standard Web Trust Sys Trust.
Chapter 9 Database Design
Biometrics Kyle O'Meara April 14, Contents Introduction Specific Types of Biometrics Examples Personal Experience Questions.
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
Chapter 7 Database Auditing Models
A Framework for Detection of Anomalous and Suspicious Behavior from Agent’s Spatio-Temporal Traces Boštjan Kaluža Depratment of Intelligent Systems, Jožef.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
National Smartcard Project Work Package 8 – Security Issues Report.
GeoPKDD Geographic Privacy-aware Knowledge Discovery and Delivery Kick-off meeting Pisa, March 14, 2005.
Chapter 10: Authentication Guide to Computer Network Security.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
SEC835 Database and Web application security Information Security Architecture.
MOBILE AD-HOC NETWORK(MANET) SECURITY VAMSI KRISHNA KANURI NAGA SWETHA DASARI RESHMA ARAVAPALLI.
Security Security is a measure of the system’s ability to protect data and information from unauthorized access while still providing access to people.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
Switch off your Mobiles Phones or Change Profile to Silent Mode.
Computer Science and Engineering 1 Service-Oriented Architecture Security 2.
September 18, 2002 Windows 2000 Server Active Directory By Jerry Haggard.
Computer Science Topical Paper Presentation #15 Zach Sloger The Secure Blackboard Pattern S e c u r e B l a c k b o a r d P a t t e r n – P a.
Operating system Security By Murtaza K. Madraswala.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Locating Mobile Agents in Distributed Computing Environment.
Ning Zhang, the University of Manchester, UK David Groep, National Institute for Nuclear and High Energy Physics, NL Blair Dillaway, OGF Security Area.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
G53SEC 1 Authentication and Identification Who? What? Where?
Engineering Essential Characteristics Security Engineering Process Overview.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
Ali Alhamdan, PhD National Information Center Ministry of Interior
14.1/21 Part 5: protection and security Protection mechanisms control access to a system by limiting the types of file access permitted to users. In addition,
G53SEC 1 Authentication and Identification Who? What? Where?
Pertemuan #9 Security in Practice Kuliah Pengaman Jaringan.
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
Academic Year 2014 Spring Academic Year 2014 Spring.
Typing Pattern Authentication Techniques 3 rd Quarter Luke Knepper.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Computer Science and Engineering 1 Mobile Computing and Security.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Keystroke Dynamics By Hafez Barghouthi.
E-Commerce E-Commerce Security?? Instructor: Safaa S.Y. Dalloul E-Business Level Try to be the Best.
Information Management System Ali Saeed Khan 29 th April, 2016.
The Fallacy Behind “There’s Nothing to Hide” Why End-to-End Encryption Is a Must in Today’s World.
Introduction to Machine Learning, its potential usage in network area,
CS457 Introduction to Information Security Systems
Presented by Edith Ngai MPhil Term 3 Presentation
Information Security, Theory and Practice.
Systems Analysis and Design in a Changing World, Fifth Edition
SECURITY MECHANISM & E-COMMERCE
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Mobile Agents.
Autonomous Aggregate Data Analytics in Untrusted Cloud
PLANNING A SECURE BASELINE INSTALLATION
Presentation transcript:

Modeling an Intelligent Continuous Authentication System to Protect Financial Information Resources Thomas G. Calderon Akhilesh Chandra John J. Cheh The University of Akron Symposium on Information Systems Assurance Integrity, Privacy, Security & Trust in an IT Context October 20-22, 2005

Objective 1.Examine fundamental principles of CA 2.Propose a four-tier framework for CA 3.Discuss implementation issues

CA defined CA is a process that verifies the identity of an information systems user continuously for the entire duration of an authorized session.

Motivation Current IT environment feeds insecurity Controls vulnerable to threats Existing solutions are static Need for an alternate, robust and dynamic solution CA fits the bill !

Implications Systems design Internal controls design Audit models and techniques Organizational learning Behavioral repercussions Integration with existing solutions & models Alternative technology based solutions

Fundamental CA Issues Traditional Authentication Models CA: Network versus User

Table 1 Summary of Four CA Levels LevelProbability StatementThresholdsFundamental Principles and Authentication Factors 1P(User)p tu Principles: Continuously assesses and verifies presence at a fixed location Factors: knowledge, possession, and biometrics 2P(User/Resource)p tu/R Principles: Continuously assesses and verifies presence and access to a resource. Does not attempt to verify the identities of entities that use specific privileges. Level 1 CA conditions are also satisfied. Factors: knowledge, possession, biometrics, and resources used 3P(User/Workstation)p tu/W Principles: Continuously assesses and verifies presence at disparate locations. Does not attempt to verify the identities of entities that use specific privileges. Level 2 CA conditions are also satisfied. Factors: knowledge, possession, biometrics, resources used, and workstations 4P(User/Transaction or Action)p tu/A Principles: Continuously assesses and verifies presence at all access points and monitors the identity of entities that use specific privileges. Level 3 CA conditions are also satisfied. Factors: knowledge, possession, biometrics, resources used, workstations, transactions profile and actions

Model Fundamentals Authentication confidences and thresholds –Probabilistic values Versus Deterministic or binary authentication

Levels of CA  Level 1 CA: user authentication  Level 2 CA: user-resource authentication  Level 3 CA: user-resource-system authentication  Level 4 CA: user-resource-system- transaction authentication

Model Implementation: with Swarm Technology

Swarm Intelligence Self-Organizing in Social Insects  Spatiotemporally Organized Networks of Pheromone Trails (Bonabeau, Dorigo, and Theraulaz, 1999)  Positive Feedback (Amplification)  Recruitment and Reinforcement  Trail Laying and Trail Following  Negative Feedback  Stabilization of Collective Patterns  Amplification of Fluctuations  Random Walks, Errors, Random Task-Switching  Continuous Optimization  Multiple Interactions  Minimum Density of Mutually Tolerant Agents

Application of Swarm Intelligence to Continuous Authentication Self-Organizing of Multiple Ant-like Monitoring Computer Agents  Spatiotemporally Organized Networks of Profile- based Trails  Positive Feedback (Amplification)  Local Autonomous Agents  User, Resources, Workstation, and Transaction  Transition Rules  Local Updates  Negative Feedback  Global Autonomous Agent  Dynamic Conflict Resolution Rules  Global Updates

Table 2 Implementation Summary of Four CA Levels LevelLearning LevelTasks*Intelligent/Predetermined ClassCorresponding Intelligent Technologies 1Minimal Single comparison of a user’s signature in each time interval t. The medium of signature can be either a knowledge factor (e.g., a password) or biometrics (e.g., biometric finger image). For special cases, CAS’s intelligent key stroke recognition agent recognizes a user’s keystroke latencies. Predetermined class in most cases, except for special cases like key stroke recognition. As a user ages, his unique biometric signature can gradually change. Multiple patterns can be used over times. This depends on special health conditions or other special situations. A simple database query engine: A user ID, and password stored in a database as long as iteration processes in Figure 1 exist. For the special cases of key stroke recognition, low level of swarm intelligence is used in coupled with database technology. 2Modest Additional profile creates a well- marked trail or pheromone as significance of a particular habit for accessing sensitive information through resource utilization Intelligent Class in Continuous Model: Enrollment is dynamic, and CAS not only authorizes access but also monitors and updates a user’s profile for future evaluation and continuous authorization in Levels 2, 3, and 4. Modest level of swarm intelligence-based technology that can handle the additional dimension of resource utilization in relation to privileged information 3Complex A user’s information about his/her movement is added to his/her previous profiles in Levels 1 and 2, using a workstation profile. This new dimensional information is an addition to information in Level 2 processes. Intelligent Class in Continuous Model: CAS with this additional dimension monitors and evaluates a user’s access to various computers in globally networked IT environments. More complex swarm intelligence technology that can handle two additional dimensions— resource use profile and workstation access profile. 4Highest In this highest level, a user’s transaction profile given his/her job and task responsibilities are added to Level 3 CA processes Intelligent Class in Continuous Model: this class performs similar processes with additional profile management Most sophisticated swarm intelligence-based technology that can handle four classes of profiles.

Challenges 1.Mobile computing dynamics 2.Technical constraints 3.Prevention vs. Detection 4.Biometric related issues 5.Access control types and Location signatures 6.Security layer 7.Privacy concerns 8.Legal issues 9.Audit trail management