Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams

Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Y. Kadobayashi, Doudou Fall
{"title":"Zero-Trust Access Control Focusing on Imbalanced Distribution in Browser Clickstreams","authors":"Taisho Sasada, Yuto Masuda, Yuzo Taenaka, Y. Kadobayashi, Doudou Fall","doi":"10.1109/SDS54264.2021.9732109","DOIUrl":null,"url":null,"abstract":"The further spread of cloud computing and telework has led to an increase in borderless activities, which has expanded the demand for constructing Zero-Trust Access Control (ZTAC). In this context, preventing information leakage is an important issue, and to protect sensitive data and confidential information in a zero-trust, it is necessary to monitor the user's behavior after authentication and make sequential decisions about authorization. In this research, we monitor account's behavior such clickstreams on the browser and incorporate it to evaluation of user's trust in access control system. Through the construction of behavior-based ZTAC system based on clickstreams, we have achieved access control that considers the naturalness of clicks without relying on the results of authentication. Moreover, toward solving the mismatch of click count between the system side and the end-user side, we synchronously updated the clickstream by the user-agent which observing and retrieving the click events in the DOM. As experimental evaluation, we verified that our ZTAC can deal with click count discrepancy and completely prevent various insider threat to sensitive data from even authenticated accounts. Also, we confirmed no significant differences in response time, memory usage, or CPU usage before and after the migration of zero-trust, indicating that it can be deployed in existing enterprise networks.","PeriodicalId":394607,"journal":{"name":"2021 Eighth International Conference on Software Defined Systems (SDS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Eighth International Conference on Software Defined Systems (SDS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SDS54264.2021.9732109","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The further spread of cloud computing and telework has led to an increase in borderless activities, which has expanded the demand for constructing Zero-Trust Access Control (ZTAC). In this context, preventing information leakage is an important issue, and to protect sensitive data and confidential information in a zero-trust, it is necessary to monitor the user's behavior after authentication and make sequential decisions about authorization. In this research, we monitor account's behavior such clickstreams on the browser and incorporate it to evaluation of user's trust in access control system. Through the construction of behavior-based ZTAC system based on clickstreams, we have achieved access control that considers the naturalness of clicks without relying on the results of authentication. Moreover, toward solving the mismatch of click count between the system side and the end-user side, we synchronously updated the clickstream by the user-agent which observing and retrieving the click events in the DOM. As experimental evaluation, we verified that our ZTAC can deal with click count discrepancy and completely prevent various insider threat to sensitive data from even authenticated accounts. Also, we confirmed no significant differences in response time, memory usage, or CPU usage before and after the migration of zero-trust, indicating that it can be deployed in existing enterprise networks.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
零信任访问控制关注浏览器点击流的不平衡分布
云计算和远程办公的进一步普及导致无边界活动的增加,这扩大了构建零信任访问控制(ZTAC)的需求。在这种情况下,防止信息泄露是一个重要的问题,为了在零信任的状态下保护敏感数据和机密信息,需要对用户认证后的行为进行监控,并对授权进行顺序决策。在本研究中,我们监测帐户在浏览器上的行为,如点击流,并将其纳入访问控制系统中用户信任的评估。通过构建基于点击流的基于行为的ZTAC系统,实现了在不依赖于认证结果的情况下,考虑点击自然度的访问控制。此外,为了解决系统端和最终用户端点击次数不匹配的问题,我们通过用户代理在DOM中观察和检索点击事件来同步更新点击流。作为实验评估,我们验证了我们的ZTAC可以处理点击计数差异,并完全防止各种内部威胁,甚至通过身份验证的帐户的敏感数据。此外,我们确认零信任迁移前后在响应时间、内存使用或CPU使用方面没有显著差异,这表明它可以部署在现有的企业网络中。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
5G Slicing for Emergency Communications The Eighth International Conference on Software Defined Systems (SDS-2021) [Front matter] Incentivising honest behaviour in P2P networks using blockchain-based reputation Aggregation in Blockchain Ecosystem Novel File-Checksum Method for Data Duplication Removal of Patients
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1