2022 IEEE Conference on Communications and Network Security (CNS) 2022
DOI: 10.1109/cns56114.2022.9947263
|View full text |Cite
|
Sign up to set email alerts
|

Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…A new security paradigm known as zero trust has emerged as a method to improve the existing boundary security approach, and many organizations are introducing zero trust solutions and services. In zero trust, inspections, such as risk scoring, which ensure security and identify vulnerabilities in devices that request access to an organization's resources, are important elements that must be performed each time a user requests a resource [25,26]. In this study, we proposed an algorithm that resolves the imbalance between security and availability that occurs when risk scoring is performed according to the same criteria for all users, as is currently performed at many companies.…”
Section: Discussionmentioning
confidence: 99%
“…A new security paradigm known as zero trust has emerged as a method to improve the existing boundary security approach, and many organizations are introducing zero trust solutions and services. In zero trust, inspections, such as risk scoring, which ensure security and identify vulnerabilities in devices that request access to an organization's resources, are important elements that must be performed each time a user requests a resource [25,26]. In this study, we proposed an algorithm that resolves the imbalance between security and availability that occurs when risk scoring is performed according to the same criteria for all users, as is currently performed at many companies.…”
Section: Discussionmentioning
confidence: 99%
“…For a specific attack scenario θ, a POMDP-based zerotrust defense under asymmetric information is developed in [12], where the defender dynamically evaluates the account's trustworthiness using the trust score (TS), defined as the belief that the user is legitimate, i.e., T S k := b k (s = 1). The defender's belief is updated in the following Bayesian manner:…”
Section: Scenario-agnostic Zero-trust Defensementioning
confidence: 99%
“…A stochastic gradient descent algorithm is proposed in [12] to minimize the cost U θ (π), leading to a simple approach to zero-trust defense (ZTD). However, the resulting optimal policy is generally scenario-dependent: the defense policy is designed for some specific system configuration and attacker capabilities.…”
Section: Scenario-agnostic Zero-trust Defensementioning
confidence: 99%
See 2 more Smart Citations