Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2554850.2555059acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

MUSES: a corporate user-centric system which applies computational intelligence methods

Published: 24 March 2014 Publication History

Abstract

This work presents the description of the architecture of a novel enterprise security system, still in development, which can prevent and deal with the security flaws derived from the users in a company. Thus, the Multiplatform Usable Endpoint Security system (MUSES) considers diverse factors such as the information distribution, the type of accesses, the context where the users are, the category of users, or the mix between personal and private data, among others. This system includes an event correlator and a risk and trust analysis engine to perform the decision process. MUSES follows a set of defined security rules, according to the enterprise security policies, but it is able to self-adapt the decisions and even create new security rules depending on the user behaviour, the specific device, and the situation or context. To this aim MUSES applies machine learning and computational intelligence techniques which can also be used to predict potential unsafe or dangerous user's behaviour.

References

[1]
A. Adams and A. Sasse. Users are not the enemy. Security and Usability: Designing Systems That People Can Use. O'Reilly Associations, 2005.
[2]
T. Back. Evolutionary algorithms in theory and practice. Oxford University Press, 1996.
[3]
C. Bishop. Pattern recognition and Machine Learning. Springer, 2006.
[4]
Blackberry. Blackberry balance. http://es.blackberry.com/business/software/blackberry-balance.html.
[5]
D. E. Goldberg. Genetic Algorithms in search, optimization and machine learning. Addison Wesley, 1989.
[6]
I. Guyon and A. Elisseeff. An introduction to variable and feature selection. J. Mach. Learn. Res., 3: 1157--1182, 2003.
[7]
J. Han, H. Cheng, D. Xin, and X. Yan. Frequent pattern mining: Current status and future directions. Data Min. Knowl. Discov., 15(1): 55--86, 2007.
[8]
IBM. Hosted mobile device security management. http://www-935.ibm.com/services/us/en/it-services/managed-security-services-cloud-computing-hosted-mobile-device-security-management.html.
[9]
A. K. Jain, M. N. Murty, and P. J. Flynn. Data clustering: A review. ACM Comput. Surv., 31(3): 264--323, Sept. 1999.
[10]
J. R. Koza. Genetic Programming: On the programming of computers by means of natural selection. MIT Press, Cambridge, MA, 1992.
[11]
S. J. Lee and K. Siau. A review of data mining techniques. Industrial Management & Data Systems, 101(1): 41--46, 2001.
[12]
D. Luckham. The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems. Addison-Wesley, MA, USA, 2002.
[13]
D. Luckham. Event Processing for Business: Organizing the Real-Time Enterprise. Wiley, USA, 2012.
[14]
R. Oppliger. Security and privacy in an online world. IEEE Computer, 44(9): 21--22, September 2011.
[15]
Samsung. Knox. http://www.samsung.com/global/business/mobile/solution/security/samsung-knox.
[16]
M. Schumacher, E. Fernandez-Buglioni, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns: Integrating Security and Systems Engineering. John Wiley & sons, 2005.
[17]
J.-M. Seigneur, P. Kölndorfer, M. Busch, and C. Hochleitner. A survey of trust and risk metrics for a byod mobile working world. In Third International Conference on Social Eco-Informatics (SOTICS 2013), page To Appear. Curran Associates Inc., November 2013.
[18]
Sophos. Mobile control. http://www.sophos.com/en-us/products/mobile-control.aspx.
[19]
G. Technology. Byod solution. http://www1.good.com/secure-mobility-solution/bring-your-own-device.html.
[20]
M. Tiffany. A survey of event correlation techniques and related topics. Research paper, Georgia Institute of Technology, 2002.
[21]
R. Xu and D. Wunsch. Survey of clustering algorithms. IEEE Transactions on Neural Networks, 16(3): 645--678, 2005.

Cited By

View all
  • (2015)Soft Computing Techniques Applied to Corporate and Personal SecurityProceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation10.1145/2739482.2768477(1193-1196)Online publication date: 11-Jul-2015
  • (2015)Formal Modeling and Verification of Opportunity-enabled Risk ManagementProceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 0110.1109/Trustcom.2015.434(676-684)Online publication date: 20-Aug-2015
  • (2015)An Improved Decision System for URL Accesses Based on a Rough Feature Selection TechniqueRecent Advances in Computational Intelligence in Defense and Security10.1007/978-3-319-26450-9_6(139-167)Online publication date: 20-Dec-2015
  • Show More Cited By

Index Terms

  1. MUSES: a corporate user-centric system which applies computational intelligence methods

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        SAC '14: Proceedings of the 29th Annual ACM Symposium on Applied Computing
        March 2014
        1890 pages
        ISBN:9781450324694
        DOI:10.1145/2554850
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 24 March 2014

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. BYOD
        2. enterprise security
        3. event correlation
        4. multiplatform
        5. risk and trust analysis
        6. security policies
        7. self-adaptation
        8. user-centric system

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        SAC 2014
        Sponsor:
        SAC 2014: Symposium on Applied Computing
        March 24 - 28, 2014
        Gyeongju, Republic of Korea

        Acceptance Rates

        SAC '14 Paper Acceptance Rate 218 of 939 submissions, 23%;
        Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)2
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 22 Sep 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2015)Soft Computing Techniques Applied to Corporate and Personal SecurityProceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation10.1145/2739482.2768477(1193-1196)Online publication date: 11-Jul-2015
        • (2015)Formal Modeling and Verification of Opportunity-enabled Risk ManagementProceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA - Volume 0110.1109/Trustcom.2015.434(676-684)Online publication date: 20-Aug-2015
        • (2015)An Improved Decision System for URL Accesses Based on a Rough Feature Selection TechniqueRecent Advances in Computational Intelligence in Defense and Security10.1007/978-3-319-26450-9_6(139-167)Online publication date: 20-Dec-2015
        • (2014)Enforcing corporate security policies via computational intelligence techniquesProceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation10.1145/2598394.2605438(1245-1252)Online publication date: 12-Jul-2014

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media