SlideShare a Scribd company logo
Project No. 318508 FP7-ICT-2011-8
Final Review, November 11th 2015
WP5:
Self-adaptive Event
Correlation
2
MUSES research areas
Corporate
security
Monitoring &
context
observation
Human-computer
interaction
Self adaptive
event
correlation
Usability for
mobile
devices
Legal
aspects
Risk , trust
& privacy
3
Index
• Objective of WP5
• Work done
• Main results /advance over SotA
• Deliverables
4
Objectives of WP5
• Collect monitoring activity
• Identify policy violation patterns in RT
• Coordinate device policy transmission
• Automated rule extraction
5
Work Done
T5.1
T5.2
T5.3
T5.4
Definition of requirements, integration and validation
mechanisms
Design and development of a domain-specific event correlation
engine
Extraction and adaptation of rules
Evolution of the correlation engine to a self-adaptive rule
learning engine
6
Work Done
- Use trials data to infer new rules
- Pre-selection phase to select algorithms
- Rule-based and decision tree algorithms
- Qualitative results analysis
- Knowledge Compiler compares with existing rules
and proposes candidate rules
T5.3 Extraction and adaptation of rules
7
Work Done
- Identification of new types of policies
- Integration with the selection of algorithms providing
better results (Data Miner)
- Integration of Knowledge Compiler: new rules as
draft
- MUSES Server Risk Management (Security-oriented
GUI)
T5.4 Evolution of the correlation engine to a self-adaptive rule
learning engine
8
Self-adaptive Event Correlation
1. Security corporate policies
2. DRL event correlation rules
3. Identify policy violations with context
4. Analyse risk
5. Compose device policy
9
EP: Device policies in real time
Policies
DRL rules
Adapt with
context
Risk
analysis
Device
policy
EP: Policies
Asset on
unsecure
WiFi
Asset on
secure WiFi
Not
sensitive
asset
Blacklists
Required
applications
Email policy
Virus
10
Password
protection
Screen lock
Accesibility
Access
Control List
Anti-virus
Assets in
corporate
folders
Bluetooth
EP: Policies
Trusted
antivirus
installed
Rooted
devices
Use of
required
applications
Application
categories
by pattern in
package
name (p2p,
torrent)
Email and
virus
11
More policies…
12
• Encryption
enforcement
Encryption
• External
storage
Use of
pendrives
• Sessions in
different
devices
Cross-
contamination
• Check
connection
properties
Usert typing a
password
• Emas: Notes
are not
allowed when
unsecure wifi
Muses Aware
App
• Device wipe
Security
incident
13
EP:Identification of security violations
14
Identification of security violations
• Traditional PDP systems
15
EP:Advance beyond SotA
• MUSES Continuous Real-Time Event Processor
PDPAccess Request
Permit
Deny
Policy compliance
XACML Policy
Expressive PDP
+
Risk Analysis
Access Request
• Policy compliance
• Risk analysis
• Adapted to current
context
Device Policy
XACML Policy
Additional context
16
KRS Timeline
January 15 April 15 May 15 June 15 October 15
Trials 1 start
Development of KRS during trials, first
version by the end of the trials.
Offline processing and KRS refinement.
Stockholm, May 2015 - Database
improvement.
KRS working during Trials 2,
online processing.
Offline processing and
enhancements.
SRM development.
•Automated Machine Learning: Rule generation
17
KRS – Data Miner
CLASSIFICATION
(JRIP, REPTREE,
PART, J48)
ASSOCIATION
(Apriori)
DATASET
(defined patterns
with decisions)
EXISTING SET OF
SECURITY RULES
OBTAINED SET OF
CLASSIFICATION/
ASSOCIATION
RULES
PROPOSED
NEW RULES
(draft)
IMPROVED SET
OF SECURITY
RULES
18
What is considered as Interesting
(attributes)?
MUSES
DB
Device information (10) OS, owner,
model, trust value, among others.
App information (3) name, vendor, and
MUSES awareness.
Asset information (4) name, location,
confidentiality, and value.
Other information (6) decision, detection
time, silent mode, event type, among others.
Connection sensor information (4)
Mail sensor information (4)
User information (4) role, trust,
account enabled, and username.
Password lexical properties (4).
• In terms of data
19
Trials 1 Vs. Trials 2
Trials 1 Trials 2
Number of gathered
events
215552 136340
Number of covered
attributes
30/40 37/40
20
Applying Clustering Techniques
• Identified groups by the K-means algorithm
63 % of patterns. Algorithm
applied label GRANTED
22% of patterns. Algorithm
applied label STRONGDENY
21
Analysing Clusters: BYOD or COPE?
UserRoles
22
Analysing Clusters: BYOD or COPE?
DeviceOS
23
KRS – New rules
• Rule candidates
– 14 correct rules
• Validated rules:3
OPEN
ASSET
public
UNSECURE
WIFI
ALLOW
OPEN
ASSET
public
UNSECURE
WIFI
DENY
BYOD
24
KRS – New rules
OPEN
ASSET
public
UNSECURE
WIFI
ALLOW
OPEN
ASSET
public
UNSECURE
WIFI
DENY
BYOD
25
KRS – New rules
OPEN
ASSET
public
UNSECURE
WIFI
ALLOW
OPEN
ASSET
public
UNSECURE
WIFI
ALLOW
COPE
26
KRS – New rules
OPEN
ASSET
confidential
UNSECURE
WIFI
OPEN
ASSET
confidential
UNSECURE
WIFI
DENY
Security
role
ALLOW
27
State of the Art
• State of the art:
– Rule adjustment
• Pros: Applied over real environments (IDS)
• Cons: Limited (rule structure is static)
– Rule refinement
• Pros: Take variability of input data into account. Rule
structure might be changed
• Cons: Lack of automation over real environments
KRS:Advance beyond SotA
28
• Improved automation (rule refinement)
• Rule structure is not static
• Rule refinement applied to security policies
• Global security rule optimization not addressed before
• Classification and feature extraction methods applied to real
data from employees
29
Deliverables
Requirements and conceptual model of self-adaptive event
correlation system (M12)
First prototype of the self-adaptive event correlation system
(M18)
Second prototype of self-adaptive event correlation system
(M28)
D5.1
D5.2
D5.3
D5.3e
Second prototype of self-adaptive event correlation system
(EXTENDED VERSION)

More Related Content

PDF
Wp4 tool demonstration_v1
PDF
Data mining in security: Ja'far Alqatawna
PDF
This was a triumph: Evolving intelligent bots for videogames. And for Science.
PDF
Towards Automatic StarCraft Strategy Generation Using Genetic Programming
PDF
Mathematical support for preventive maintenance periodicity optimization of r...
PDF
Benchmarking languages for evolutionary algorithms
PDF
Evolutionary Deckbuilding in Hearthstone
Wp4 tool demonstration_v1
Data mining in security: Ja'far Alqatawna
This was a triumph: Evolving intelligent bots for videogames. And for Science.
Towards Automatic StarCraft Strategy Generation Using Genetic Programming
Mathematical support for preventive maintenance periodicity optimization of r...
Benchmarking languages for evolutionary algorithms
Evolutionary Deckbuilding in Hearthstone

Viewers also liked (20)

PDF
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
ODP
Benchmarking languages for evolutionary computation
PDF
Ejemplos de investigación en videojuegos
PDF
Hackahton smart cities 2016 (Mayo 2016)
PPTX
Event Correlation Applications for Utilities
PDF
Introduction to Numetric (1)
PDF
Appriss Automates Support of 650 End-Point Routers with CA Process Automation
PPTX
Correlation: Why It's Important to Your Security Infrastructure
PPTX
Pre-Con Ed: What's New in CA Service Management
PPT
Ca automation suite screen shots 2
PDF
Using data science to automate event correlation - June 2016 - Dan Turchin - ...
PDF
Smart city hackathon
PDF
Case Study: Taking IT Asset Management to the Next Level With Process Automation
PDF
HfS Webinar Slides: Smart Process Automation in Enterprise Business
PDF
Business process automation: The past, present and future
PDF
Robotic Process Automation for Financial Services
PDF
APIs and Process automation at APIDays Global 2016
PDF
Chatbots + rpa (robotic process automation)
PDF
Everest Group FIT matrix for Robotic Process Automation (rpa) technology
PPTX
Reducing MTTR and False Escalations: Event Correlation at LinkedIn
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
Benchmarking languages for evolutionary computation
Ejemplos de investigación en videojuegos
Hackahton smart cities 2016 (Mayo 2016)
Event Correlation Applications for Utilities
Introduction to Numetric (1)
Appriss Automates Support of 650 End-Point Routers with CA Process Automation
Correlation: Why It's Important to Your Security Infrastructure
Pre-Con Ed: What's New in CA Service Management
Ca automation suite screen shots 2
Using data science to automate event correlation - June 2016 - Dan Turchin - ...
Smart city hackathon
Case Study: Taking IT Asset Management to the Next Level With Process Automation
HfS Webinar Slides: Smart Process Automation in Enterprise Business
Business process automation: The past, present and future
Robotic Process Automation for Financial Services
APIs and Process automation at APIDays Global 2016
Chatbots + rpa (robotic process automation)
Everest Group FIT matrix for Robotic Process Automation (rpa) technology
Reducing MTTR and False Escalations: Event Correlation at LinkedIn
Ad

Similar to MUSES WP5 Final Conclusions (20)

PDF
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
PDF
IRJET- Fault Detection and Prediction of Failure using Vibration Analysis
PPTX
Digital Forensics by William C. Barker (NIST)
PDF
BDE Technical Webinar 1 : Requirements elicitation
PDF
MUSES: A Corporate User-Centric System which Applies Computational Intelligen...
DOCX
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
DOCX
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
PDF
Data+Management+Masterclasssdfsdfsdfsd.pdf
PPTX
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
PDF
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
PDF
Neo4j GraphTour Santa Monica 2019 - Amundsen Presentation
PDF
PPTX
Defining ontologies for IP traffic measurements at MOI ISG
PPTX
How Lyft Drives Data Discovery
PDF
GRA, NIEM and XACML Security Profiles July 2012
PDF
Data in Motion - tech-intro-for-paris-hackathon
PDF
Analytics&IoT
PDF
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
PDF
N ETWORK F AULT D IAGNOSIS U SING D ATA M INING C LASSIFIERS
PPTX
DataOps @ Scale: A Modern Framework for Data Management in the Public Sector
D-Eclat Association Rules on Vertically Partitioned Dynamic Data to Outsource...
IRJET- Fault Detection and Prediction of Failure using Vibration Analysis
Digital Forensics by William C. Barker (NIST)
BDE Technical Webinar 1 : Requirements elicitation
MUSES: A Corporate User-Centric System which Applies Computational Intelligen...
2014 IEEE JAVA DATA MINING PROJECT Secure mining of association rules in hori...
IEEE 2014 JAVA DATA MINING PROJECTS Secure mining of association rules in hor...
Data+Management+Masterclasssdfsdfsdfsd.pdf
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Neo4j GraphTour Santa Monica 2019 - Amundsen Presentation
Defining ontologies for IP traffic measurements at MOI ISG
How Lyft Drives Data Discovery
GRA, NIEM and XACML Security Profiles July 2012
Data in Motion - tech-intro-for-paris-hackathon
Analytics&IoT
IRJET- Classification of Pattern Storage System and Analysis of Online Shoppi...
N ETWORK F AULT D IAGNOSIS U SING D ATA M INING C LASSIFIERS
DataOps @ Scale: A Modern Framework for Data Management in the Public Sector
Ad

Recently uploaded (20)

PPTX
microscope-Lecturecjchchchchcuvuvhc.pptx
PPTX
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
PDF
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
PDF
. Radiology Case Scenariosssssssssssssss
PPTX
INTRODUCTION TO EVS | Concept of sustainability
PDF
An interstellar mission to test astrophysical black holes
PPTX
Classification Systems_TAXONOMY_SCIENCE8.pptx
PPTX
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
PPTX
Microbiology with diagram medical studies .pptx
PPTX
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
PDF
HPLC-PPT.docx high performance liquid chromatography
PPT
POSITIONING IN OPERATION THEATRE ROOM.ppt
PPTX
Comparative Structure of Integument in Vertebrates.pptx
PDF
Sciences of Europe No 170 (2025)
PDF
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
PPT
protein biochemistry.ppt for university classes
PPTX
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
PPTX
Cell Membrane: Structure, Composition & Functions
PPTX
The KM-GBF monitoring framework – status & key messages.pptx
PDF
IFIT3 RNA-binding activity primores influenza A viruz infection and translati...
microscope-Lecturecjchchchchcuvuvhc.pptx
ognitive-behavioral therapy, mindfulness-based approaches, coping skills trai...
VARICELLA VACCINATION: A POTENTIAL STRATEGY FOR PREVENTING MULTIPLE SCLEROSIS
. Radiology Case Scenariosssssssssssssss
INTRODUCTION TO EVS | Concept of sustainability
An interstellar mission to test astrophysical black holes
Classification Systems_TAXONOMY_SCIENCE8.pptx
EPIDURAL ANESTHESIA ANATOMY AND PHYSIOLOGY.pptx
Microbiology with diagram medical studies .pptx
G5Q1W8 PPT SCIENCE.pptx 2025-2026 GRADE 5
HPLC-PPT.docx high performance liquid chromatography
POSITIONING IN OPERATION THEATRE ROOM.ppt
Comparative Structure of Integument in Vertebrates.pptx
Sciences of Europe No 170 (2025)
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
protein biochemistry.ppt for university classes
DRUG THERAPY FOR SHOCK gjjjgfhhhhh.pptx.
Cell Membrane: Structure, Composition & Functions
The KM-GBF monitoring framework – status & key messages.pptx
IFIT3 RNA-binding activity primores influenza A viruz infection and translati...

MUSES WP5 Final Conclusions

  • 1. Project No. 318508 FP7-ICT-2011-8 Final Review, November 11th 2015 WP5: Self-adaptive Event Correlation
  • 2. 2 MUSES research areas Corporate security Monitoring & context observation Human-computer interaction Self adaptive event correlation Usability for mobile devices Legal aspects Risk , trust & privacy
  • 3. 3 Index • Objective of WP5 • Work done • Main results /advance over SotA • Deliverables
  • 4. 4 Objectives of WP5 • Collect monitoring activity • Identify policy violation patterns in RT • Coordinate device policy transmission • Automated rule extraction
  • 5. 5 Work Done T5.1 T5.2 T5.3 T5.4 Definition of requirements, integration and validation mechanisms Design and development of a domain-specific event correlation engine Extraction and adaptation of rules Evolution of the correlation engine to a self-adaptive rule learning engine
  • 6. 6 Work Done - Use trials data to infer new rules - Pre-selection phase to select algorithms - Rule-based and decision tree algorithms - Qualitative results analysis - Knowledge Compiler compares with existing rules and proposes candidate rules T5.3 Extraction and adaptation of rules
  • 7. 7 Work Done - Identification of new types of policies - Integration with the selection of algorithms providing better results (Data Miner) - Integration of Knowledge Compiler: new rules as draft - MUSES Server Risk Management (Security-oriented GUI) T5.4 Evolution of the correlation engine to a self-adaptive rule learning engine
  • 9. 1. Security corporate policies 2. DRL event correlation rules 3. Identify policy violations with context 4. Analyse risk 5. Compose device policy 9 EP: Device policies in real time Policies DRL rules Adapt with context Risk analysis Device policy
  • 10. EP: Policies Asset on unsecure WiFi Asset on secure WiFi Not sensitive asset Blacklists Required applications Email policy Virus 10 Password protection Screen lock Accesibility Access Control List Anti-virus Assets in corporate folders Bluetooth
  • 12. More policies… 12 • Encryption enforcement Encryption • External storage Use of pendrives • Sessions in different devices Cross- contamination • Check connection properties Usert typing a password • Emas: Notes are not allowed when unsecure wifi Muses Aware App • Device wipe Security incident
  • 15. • Traditional PDP systems 15 EP:Advance beyond SotA • MUSES Continuous Real-Time Event Processor PDPAccess Request Permit Deny Policy compliance XACML Policy Expressive PDP + Risk Analysis Access Request • Policy compliance • Risk analysis • Adapted to current context Device Policy XACML Policy Additional context
  • 16. 16 KRS Timeline January 15 April 15 May 15 June 15 October 15 Trials 1 start Development of KRS during trials, first version by the end of the trials. Offline processing and KRS refinement. Stockholm, May 2015 - Database improvement. KRS working during Trials 2, online processing. Offline processing and enhancements. SRM development.
  • 17. •Automated Machine Learning: Rule generation 17 KRS – Data Miner CLASSIFICATION (JRIP, REPTREE, PART, J48) ASSOCIATION (Apriori) DATASET (defined patterns with decisions) EXISTING SET OF SECURITY RULES OBTAINED SET OF CLASSIFICATION/ ASSOCIATION RULES PROPOSED NEW RULES (draft) IMPROVED SET OF SECURITY RULES
  • 18. 18 What is considered as Interesting (attributes)? MUSES DB Device information (10) OS, owner, model, trust value, among others. App information (3) name, vendor, and MUSES awareness. Asset information (4) name, location, confidentiality, and value. Other information (6) decision, detection time, silent mode, event type, among others. Connection sensor information (4) Mail sensor information (4) User information (4) role, trust, account enabled, and username. Password lexical properties (4).
  • 19. • In terms of data 19 Trials 1 Vs. Trials 2 Trials 1 Trials 2 Number of gathered events 215552 136340 Number of covered attributes 30/40 37/40
  • 20. 20 Applying Clustering Techniques • Identified groups by the K-means algorithm 63 % of patterns. Algorithm applied label GRANTED 22% of patterns. Algorithm applied label STRONGDENY
  • 21. 21 Analysing Clusters: BYOD or COPE? UserRoles
  • 22. 22 Analysing Clusters: BYOD or COPE? DeviceOS
  • 23. 23 KRS – New rules • Rule candidates – 14 correct rules • Validated rules:3 OPEN ASSET public UNSECURE WIFI ALLOW OPEN ASSET public UNSECURE WIFI DENY BYOD
  • 24. 24 KRS – New rules OPEN ASSET public UNSECURE WIFI ALLOW OPEN ASSET public UNSECURE WIFI DENY BYOD
  • 25. 25 KRS – New rules OPEN ASSET public UNSECURE WIFI ALLOW OPEN ASSET public UNSECURE WIFI ALLOW COPE
  • 26. 26 KRS – New rules OPEN ASSET confidential UNSECURE WIFI OPEN ASSET confidential UNSECURE WIFI DENY Security role ALLOW
  • 27. 27 State of the Art • State of the art: – Rule adjustment • Pros: Applied over real environments (IDS) • Cons: Limited (rule structure is static) – Rule refinement • Pros: Take variability of input data into account. Rule structure might be changed • Cons: Lack of automation over real environments
  • 28. KRS:Advance beyond SotA 28 • Improved automation (rule refinement) • Rule structure is not static • Rule refinement applied to security policies • Global security rule optimization not addressed before • Classification and feature extraction methods applied to real data from employees
  • 29. 29 Deliverables Requirements and conceptual model of self-adaptive event correlation system (M12) First prototype of the self-adaptive event correlation system (M18) Second prototype of self-adaptive event correlation system (M28) D5.1 D5.2 D5.3 D5.3e Second prototype of self-adaptive event correlation system (EXTENDED VERSION)

Editor's Notes

  • #5: Collect monitoring activity (user, device, applications) Identify policy violation patterns in real time, according to corporate policies Coordinate device policy transmission Automated rule extraction
  • #8: New types of policies: Detection of rooted devices Use of resources depending on the device located in specific zones Use of restricted external data storage like USB pendrives Enforcement of data encryption Use of bluetooth Detection of password insertion
  • #10: Partimos de las políticas básicas en XACML, que usualmente no son demasiado completas. Las transformamos en reglas básicas de Drools. Mejoramos las reglas gracias a la observación de contexto que tiene lugar en los momentos en los que se produce la situación descrita en la política básica. Gracias a ese contexto, podemos detallar la situación y proporcionar mejores respuestas al usuario, más adaptadas a la situación actual del dispositivo en consonancia con su petición actual. Adicionalmente, damos paso al cálculo del riesgo, proporcionando las pistas más útiles para el cálculo de la probabilidad de las amenazas. Este cálculo del riesgo es el que finalmente valora la decisión final. 4. Finalmente, se envía la política de dispositivo.
  • #11: New types of policies: Detection of rooted devices Use of resources depending on the device located in specific zones Use of restricted external data storage like USB pendrives Enforcement of data encryption Use of bluetooth Detection of password insertion
  • #12: New types of policies: Detection of rooted devices Use of resources depending on the device located in specific zones Use of restricted external data storage like USB pendrives Enforcement of data encryption Use of bluetooth Detection of password insertion
  • #13: New types of policies: Detection of rooted devices Use of resources depending on the device located in specific zones Use of restricted external data storage like USB pendrives Enforcement of data encryption Use of bluetooth Detection of password insertion
  • #21: K-means uses Euclidean distance
  • #22: Resulting clusters from simple K-means application to 5 selected features, including the label, used as class. The horizontal axis represents the device owner, and the vertical axis, the user role.
  • #23: Resulting clusters from simple K-means application to 5 selected features, including the label, used as class. The horizontal axis represents the device owner, and the vertical axis, the device operating system.
  • #28: Rule based systems have an advantage from the self-adaptation perspective, since knowledge (rules) is separated from the inference engine, which alllows to refine and improve the rules independently of the mechanisms to correlate events. Again, real time is important in MUSES. Other systems like case-based correlation are not suitable for real-time orientations. One important question in the process is whether or not the refining system uses the same process used to develop the initial knowledge base, in other words, the rules that an expert has defined according to his existing background of the domain system. (e.g. Look for context events showing a relationship with threats associated to policies (e.g. Confidential data leaks or integrity data loss might be associated to unencrypted wifis or use of USB sticks)
  • #29: The application of classification and feature extraction methods to real data in real companies is not usual (researchers consider synthetic data/testbeds). The creation/adaptation of rules in the KRS is based on the user’s behaviour (data from events produced by the employees of the company), rather than the common consideration of external threats. The optimisation of global security rules has not been addressed before from this point of view. Data Mining has been usually applied aiming for a specific general objective (detection of threats, recognition of anomalies), but it has not been linked with a following process (refinement) to improve the system.
  • #30: Due to the fact that the delivery date of the initial document of D5.3 was on M28, we have extended the deliverable in order to describe the final version of both KRS and EP components, while also including the final results analysis. In fact, it is at the end of the project, where a bigger amount of data has been analyzed through the execution of 2 rounds of trials, where we have more significant and relevant results. These results have been gathered and analyzed on the final D5.3 extended version, which was not planned at first, but we considered that it would provide a more precise snapshot of the achieved results, especially for the KRS and the way we present results to the CSO in the MUSES SRM.
  • #32: Emphasise: real data environments