论文标题
端点检测和响应系统收集的数据应用于基于零信任原理的网络安全系统的应用
Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust Algorithm
论文作者
论文摘要
传统上,企业的安全系统基于强大的密码学,身份验证和密钥共享具有隐式访问,其中访问控制基于基于角色的访问控制(RBAC),其中诸如经理,会计师等角色等角色提供了决定主题权威的方式。但是,多年来对企业网络的攻击后分析表明,由于企业本身的隐式信任人,大多数情况下,有意或意外地发生安全漏洞。零信任体系结构是基于永不隐含地授予信任的原则,而是不断评估每个资源访问请求的信任参数,并且具有严格但不严格的协议集,用于访问资源主体的访问控制。端点检测和响应(EDR)系统是在企业网络内及其周围收集大量属性的工具,以密切了解复杂的入侵。在我们的工作中,我们寻求使用战术出处分析,阈值加密和声誉管理来部署EDR系统并构建信任算法,以连续记录数据,评估对象的信任,并同时分析它们,以针对已知威胁向量数据库提供有条件的访问控制。但是,EDR工具生成了大量数据,从而导致错误警报,错误探讨以及相应的高积压任务使其变得不可行,这是使用战术出处分析和信息理论来解决的。
Traditionally, security systems for enterprises have implicit access based on strong cryptography, authentication and key sharing, wherein access control is based on Role Based Access Control (RBAC), in which roles such as manager, accountant and so on provide a way of deciding a subject's authority. However, years of post-attack analysis on enterprise networks has shown that a majority of times, security breaches occur intentionally or accidently due to implicitly trusted people of an enterprise itself. Zero Trust Architecture works on the principle of never granting trust implicitly, but rather continuously evaluating the trust parameters for each resource access request and has a strict, but not rigid, set of protocols for access control of a subject to resources. Endpoint Detection and Response (EDR) systems are tools that collect a large number of attributes in and around machines within an enterprise network to have close visibility into sophisticated intrusion. In our work, we seek to deploy EDR systems and build trust algorithms using tactical provenance analysis, threshold cryptography and reputation management to continuously record data, evaluate trust of a subject, and simultaneously analyze them against a database of known threat vectors to provide conditional access control. However, EDR tools generate a high volume of data that leads to false alarms, misdetections and correspondingly a high backlog of tasks that makes it infeasible, which is addressed using tactical provenance analysis and information theory.