muses poster4evostar2013

1
Multiplatform Usab Multiplatform Usab The overall purpose of MUSES i The overall purpose of MUSES i by reducing the risks introduced by reducing the risks introduced Most corporate security incidents are caused by organization Most corporate security incidents are caused by organization maliciousbehaviour. MUSES will provide a device independent, user-centric and se MUSES will provide a device independent, user-centric and se concept of seamless working experience on different devices, in follow up the process on different ones, without corporate digit follow up the process on different ones, without corporate digit MUSES aims at the benefit of the co Evolutionary Computation will be used in Evolutionary Computation will be used in User modelling with models optimised to match observations using EC. observations using EC. MUSES will try to create a model of users and their context so that behaviours that can lead to their context so that behaviours that can lead to security problems can be previewed and, if possible, avoided. These user models will depend possible, avoided. These user models will depend on observations of the context, but also will employ heuristics to match them to known non- employ heuristics to match them to known non- safe behaviours. EC will be used as a metaheuristic to obtain optimal models matching reality . matching reality . MUSES partners S2 Grupo (ES), Universidad de Granada (ES), HITEC (DE), U MUSES partners S2 Grupo (ES), Universidad de Granada (ES), HITEC (DE), U Engineering – CURE (AT), Wind Telecomunicazioni (IT), TXT e-s Project No. 318508 FP7-ICT-2011-8 MUSES Budget: 4.76M€ EU Funding: 3.59M€ Contact: Anna I. Esparcia [email protected] ble Endpoint Security Contact: Anna I. Esparcia [email protected] JJ Merelo [email protected] ble Endpoint Security is to foster corporate security is to foster corporate security d by user behaviour d by user behaviour insiders, either by their lack of knowledge or inadequate or insiders, either by their lack of knowledge or inadequate or elf-adaptive corporate security system, able to cope with the elf-adaptive corporate security system, able to cope with the n which a user may start a session on a device and location and tal asset loss. tal asset loss. ompany, but focusing on the user n MUSES in two different contexts: n MUSES in two different contexts: Complex Event Processing using EC so that the underlying mechanisms can be found out. underlying mechanisms can be found out. In some cases, and independently of specific user behaviour, sequences of actions might lead to behaviour, sequences of actions might lead to possible security failures. Complex Event Processing captures these sequences in real time Processing captures these sequences in real time and tries to model them so that the next action can be foreseen. To create these models, EC will can be foreseen. To create these models, EC will be applied also in conjunction with other heuristics. Université de Genève (CH), Center for Usability Research & Université de Genève (CH), Center for Usability Research & solutions (IT), KU Leuven (BE) and Sweden Connectivity (SE).

Upload: anna-esparcia

Post on 06-Jul-2015

103 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Muses poster4evostar2013

Multiplatform Usable Multiplatform Usable

The overall purpose of MUSES isThe overall purpose of MUSES is

by reducing the risks introducedby reducing the risks introduced

Most corporate security incidents are caused by organizationMost corporate security incidents are caused by organization

malicious behaviour.

MUSES will provide a device independent, user-centric and selfMUSES will provide a device independent, user-centric and self

concept of seamless working experience on different devices, in

follow up the process on different ones, without corporate digitalfollow up the process on different ones, without corporate digital

MUSES aims at the benefit of the company

Evolutionary Computation will be used in Evolutionary Computation will be used in

User modelling with models optimised to match

observations using EC.observations using EC.

MUSES will try to create a model of users and

their context so that behaviours that can lead totheir context so that behaviours that can lead to

security problems can be previewed and, if

possible, avoided. These user models will dependpossible, avoided. These user models will depend

on observations of the context, but also will

employ heuristics to match them to known non-employ heuristics to match them to known non-

safe behaviours. EC will be used as asafe behaviours. EC will be used as a

metaheuristic to obtain optimal models

matching reality.matching reality.

MUSES partners

S2 Grupo (ES), Universidad de Granada (ES), HITEC (DE), Un

MUSES partners

S2 Grupo (ES), Universidad de Granada (ES), HITEC (DE), Un

Engineering – CURE (AT), Wind Telecomunicazioni (IT), TXT e-so

Project No. 318508 FP7-ICT-2011-8Project No. 318508 FP7-ICT-2011-8

MUSES Budget: 4.76M€

EU Funding: 3.59M€

Contact: Anna I. Esparcia – [email protected]

Usable Endpoint Security

Contact: Anna I. Esparcia – [email protected]

JJ Merelo – [email protected]

Usable Endpoint Security

is to foster corporate securityis to foster corporate security

introduced by user behaviourintroduced by user behaviour

insiders, either by their lack of knowledge or inadequate orinsiders, either by their lack of knowledge or inadequate or

self-adaptive corporate security system, able to cope with theself-adaptive corporate security system, able to cope with the

in which a user may start a session on a device and location and

digital asset loss.digital asset loss.

company, but focusing on the user

will be used in MUSES in two different contexts:will be used in MUSES in two different contexts:

Complex Event Processing using EC so that the

underlying mechanisms can be found out.underlying mechanisms can be found out.

In some cases, and independently of specific user

behaviour, sequences of actions might lead tobehaviour, sequences of actions might lead to

possible security failures. Complex Event

Processing captures these sequences in real timeProcessing captures these sequences in real time

and tries to model them so that the next action

can be foreseen. To create these models, EC willcan be foreseen. To create these models, EC will

be applied also in conjunction with otherbe applied also in conjunction with other

heuristics.

Université de Genève (CH), Center for Usability Research &Université de Genève (CH), Center for Usability Research &

solutions (IT), KU Leuven (BE) and Sweden Connectivity (SE).