1 Confidentiality and Trust Management in a Coalition Environment Lecture #11 Dr. Bhavani Thuraisingham February 13, 2008 Data and Applications Security.

Slides:



Advertisements
Similar presentations
Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
Advertisements

Towards Remote Policy Enforcement for Runtime Protection of Mobile Code Using Trusted Computing Xinwen Zhang Francesco Parisi-Presicce Ravi Sandhu
Scalable Parallel Intrusion Detection Fahad Zafar Advising Faculty: Dr. John Dorband and Dr. Yaacov Yeesha 1 University of Maryland Baltimore County.
Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Malicious Logic What is malicious logic Types of malicious logic Defenses Computer Security: Art and Science © Matt Bishop.
Assured Information Sharing for Security Applications: Malicious Code Detection Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Data Mining for Security Applications: Detecting Malicious Executables Mr. Mehedy M. Masud (PhD Student) Prof. Latifur Khan Prof. Bhavani Thuraisingham.
Extended Role Based Access Control – Based Design and Implementation for a Secure Data Warehouse Dr. Bhavani Thuraisingham Srinivasan Iyer.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2013 Assured Cloud Computing.
A Hybrid Model to Detect Malicious Executables Mohammad M. Masud Latifur Khan Bhavani Thuraisingham Department of Computer Science The University of Texas.
UT DALLAS Erik Jonsson School of Engineering & Computer Science FEARLESS engineering Incentive compatible Assured Data Sharing & Mining Murat Kantarcioglu.
Assured Information Sharing for Security and Intelligence Applications Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu Prof. Kevin.
1 Adapted from Pearson Prentice Hall Adapted form James A. Senn’s Information Technology, 3 rd Edition Chapter 7 Enterprise Databases and Data Warehouses.
1 How to 0wn the Internet in Your Spare Time Authors: Stuart Staniford, Vern Paxson, Nicholas Weaver Publication: Usenix Security Symposium, 2002 Presenter:
SEC835 Practical aspects of security implementation Part 1.
Data Management Information Management Knowledge Management Data and Applications Security Challenges Bhavani Thuraisingham October 2006.
Security Engineering Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas July 2009.
Information Operation across Infospheres: Assured Information Sharing Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu Prof. Kevin.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security August.
Assured Information Sharing. Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George Mason University.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
Dr. Bhavani Thuraisingham August 2006 Building Trustworthy Semantic Webs Unit #1: Introduction to The Semantic Web.
Windows Role-Based Access Control Longhorn Update
Cyber Security Research at the University of Texas at Dallas Sample Projects Prof. Bhavani Thuraisingham, PhD, CISSP Prof. Latifur Khan, PhD Prof. Murat.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Assignment #1 on Access.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Policies September 7, 2010.
Data and Applications Security Research at the University of Texas at Dallas Dr. Bhavani Thuraisingham The University of Texas at Dallas April 25, 2006.
Assured Information Sharing for Security and Intelligence Applications Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu Prof. Kevin.
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) November 2012 Assured Cloud Computing for Assured Information Sharing.
 Frequent Word Combinations Mining and Indexing on HBase Hemanth Gokavarapu Santhosh Kumar Saminathan.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
m-Privacy for Collaborative Data Publishing
Introduction Program File Authorization Security Theorem Active Code Authorization Authorization Logic Implementation considerations Conclusion.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #1 Introduction to Data and Applications Security and Digital Forensics.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Dr. Bhavani Thuraisingham January 14, 2011 Building Trustworthy Semantic Webs Lecture #1: Introduction to Trustworthy Semantic Web.
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Information Operation across Infospheres Prof. Bhavani Thuraisingham and Prof. Latifur Khan The University of Texas at Dallas Prof. Ravi Sandhu George.
A Blackboard-Based Learning Intrusion Detection System: A New Approach
Erik Jonsson School of Engineering and Computer Science The University of Texas at Dallas Cyber Security Research on Engineering Solutions Dr. Bhavani.
Design and Simulation of Trust Management Techniques for a Coalition Data Sharing Environment Dr.Bhavani Thuraisingham Srinivasan Iyer The University of.
Collaborative learning for security and repair in application communities MIT site visit April 10, 2007 Conclusion.
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 2013 Cloud Computing for Assured Information Sharing.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #11 Secure Heterogeneous.
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
Information Sharing for Military Stabilization and Reconstruction Operations Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu The.
Assured Information Sharing for Security Applications: Malicious Code Detection Prof. Bhavani Thuraisingham Prof. Latifur Khan Prof. Murat Kantarcioglu.
Data and Applications Security
Lecture #11: Ontology Engineering Dr. Bhavani Thuraisingham
Data and Applications Security
Waikato Environment for Knowledge Analysis
Assured Cloud Computing for Assured Information Sharing
Hardware Security – Highlevel Survey Review for Exam 4
Data and Applications Security Developments and Directions
Intrusion Detection system
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Building Trustworthy Semantic Web
Trustworthy Semantic Web
Data and Applications Security
Access Control Evolution and Prospects
Data and Applications Security Developments and Directions
Data and Applications Security
Data and Applications Security
Presentation transcript:

1 Confidentiality and Trust Management in a Coalition Environment Lecture #11 Dr. Bhavani Thuraisingham February 13, 2008 Data and Applications Security Developments and Directions

2 Acknowledgements: AFOSR Funded Project Students - UTDallas Dilsad Cavus (MS, Data mining and data sharing) Srinivasan Iyer (MS, Trust management) Ryan Layfield (PhD, Game theory) Mehdi (PhD, Worm detection) - GMU Min (PhD, Extended RBAC) Faculty and Staff - UTDallas Prof. Khan (Co-PI), Prof. Murat (Game theory) Dr. Mamoun Awad (Data mining and Data sharing) GMU: Prof. Ravi Sandhu

3 Architecture Export Data/Policy Component Data/Policy for Agency A Data/Policy for Federation Export Data/Policy Component Data/Policy for Agency C Component Data/Policy for Agency B Export Data/Policy

4 Our Approach Integrate the Medicaid claims data and mine the data; next enforce policies and determine how much information has been lost by enforcing policies Examine RBAC and UCON in a coalition environment Apply game theory and probing techniques to extract information from non cooperative partners; conduct information operations and determine the actions of an untrustworthy partner. Defensive and offensive operations

5 Data Sharing, Miner and Analyzer Assume N organizations. - The organizations don’t want to share what they have. - They hide some information. - They share the rest. Simulates N organizations which - Have their own policies - Are trusted parties Collects data from each organization, - Processes it, - Mines it, - Analyzes the results

6 Data Partitioning and Policies Partitioning - Horizontal: Has all the records about some entities - Vertical: Has subset of the fields of all entities - Hybrid: Combination of Horizontal and Vertical partitioning Policies - XML document - Informs which attributes can be released Release factor: - Is the percentage of attributes which are released from the dataset by an organization. - A dataset has 40 attributes. “Organization 1” releases 8 attributes RF=8/40=20%

7 Example Policies

8 Processing 1. Load and Analysis. - loads the generated rules, - analyzes them, - displays in the charts. 2. Run ARM. - chooses the arff file - Runs the Apriori algorithm, - displays the association rules, frequent item sets and their confidences. 3. Process DataSet: - Processes the dataset using Single Processing or Batch Processing.

9 Extension For Trust Management Each Organization maintains a Trust Table for Other organization. The Trust level is managed based on the quality of Information. Minimum Threshold- below which no Information will be shared. Maximum Threshold - Organization is considered Trusted partner.

10 Role-based Usage Control (RBUC) RBAC with UCON extension

11 RBUC in Coalition Environment The coalition partners maybe trustworthy), semi-trustworthy) or untrustworthy), so we can assign different roles on the users (professor) from different infospheres, e.g. professor role, trustworthy professor role, semi-trustworthy professor role, untrustworthy professor role. We can enforce usage control on data by set up object attributes to different roles during permission-role-assignment, e.g. professor role: 4 times a day, trustworthy role: 3 times a day semi-trustworthy professor role: 2 times a day, untrustworthy professor role: 1 time a day

12 Coalition Game Theory Lie Tell Truth LieTell Truth PjPiPjPi A = Value expected from telling the truth B = Value expected from lying M = Loss of value due to discovery of lie L = Loss of value due to being lied to = Percieved probability by player i that player j will perform action fake: Choosing to lie verify: Choosing to verify Players Strategy for Player i Strategy for Player j Expected Benefit from Strategy

13 Coalition Game Theory Results - Algorithm proved successful against competing agents - Performed well alone, benefited from groups of likeminded agents - Clear benefit of use vs. simpler alternatives - Worked well against multiple opponents with different strategies Pending Work - Analyzing dynamics of data flow and correlate successful patterns - Setup fiercer competition among agents Tit-for-tat Algorithm Adaptive Strategy Algorithm (a.k.a. Darwinian Game Theory) Randomized Strategic Form - Consider long-term games Data gathered carries into next game Consideration of reputation (‘trustworthiness’) necessary

14 Detecting Malicious Executables The New Hybrid Model What are malicious executables? Virus, Exploit, Denial of Service (DoS), Flooder, Sniffer, Spoofer, Trojan etc. Exploits software vulnerability on a victim, May remotely infect other victims Malicious code detection: approaches Signature based : not effective for new attacks Our approach: Reverse engineering applied to generate assembly code features, gaining higher accuracy than simple byte code features Executable Files Select Best features using Information Gain Byte-Codes n-grams Feature vector (n-byte sequences) Reduced Feature vector (n-byte sequences) Machine- Learning Feature vector (Assembly code Sequences) Replace byte-code with assembly code Malicious / Benign ? Hex-dump

15 Current Directions Developed a plan to implement Information Operations for untrustworthy partners and will start the implementation in February 2007 Continuing with the design and implementation of RBUC for Coalitions Enhancing the game theory based model for semi-trustworthy partners Investigate Policy Management for a Need to share environment