Trust Threshold Policy for Explainable and Adaptive Zero-Trust Defense in Enterprise Networks

被引:3
|
作者
Ge, Yunfei [1 ]
Zhu, Quanyan [1 ]
机构
[1] NYU, Dept Elect & Comp Engn, New York, NY 10012 USA
来源
2022 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS) | 2022年
关键词
Zero Trust Security; Network Security; Partially Observable Markov Decision Processes (POMDP); Threshold Policy; Trust Evaluation; FRAMEWORK;
D O I
10.1109/CNS56114.2022.9947263
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In response to the vulnerabilities in traditional perimeter-based network security, the zero trust framework is a promising approach to secure modern network systems and address the challenges. The core of zero trust security is agent-centric trust evaluation and trust-based security decisions. The challenges, however, arise from the limited observations of the agent's footprint and asymmetric information in the decision-making. An effective trust policy needs to tradeoff between the security and usability of the network. The explainability of the policy facilitates the human understanding of the policy, the trust of the result, as well as the adoption of the technology. To this end, we formulate a zero-trust defense model using Partially Observable Markov Decision Processes (POMDP), which captures the uncertainties in the observations of the defender. The framework leads to an explainable trust-threshold policy that determines the defense policy based on the trust scores. This policy is shown to achieve optimal performance under mild conditions. The trust threshold enables an efficient algorithm to compute the defense policy while providing online learning capabilities. We use an enterprise network as a case study to corroborate the results. We discuss key factors on the trust threshold and illustrate how the trust threshold policy can adapt to different environments.
引用
收藏
页码:359 / 364
页数:6
相关论文
共 50 条
  • [1] A Zero-Trust Model for Intrusion Detection in Drone Networks
    Ouiazzane, Said
    Addou, Malika
    Barramou, Fatimazahra
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 525 - 537
  • [2] Zero-Trust Artificial Intelligence?
    Laplante, Phil
    Voas, Jeffrey
    COMPUTER, 2022, 55 (02) : 10 - 12
  • [3] Quantum Computing: A Tool for Zero-Trust Wireless Networks
    Farouk, Ahmed
    Al-Kuwari, Saif
    Abulkasim, Hussein
    Mumtaz, Shahid
    Adil, Muhammad
    Song, Houbing Herbert
    IEEE NETWORK, 2025, 39 (01): : 140 - 148
  • [4] Zero-Trust Marine Cyberdefense for IoT-Based Communications: An Explainable Approach
    Nkoro, Ebuka Chinaechetam
    Njoku, Judith Nkechinyere
    Nwakanma, Cosmas Ifeanyi
    Lee, Jae-Min
    Kim, Dong-Seong
    ELECTRONICS, 2024, 13 (02)
  • [5] Zero-Trust Communication between Chips
    Belwafi, Kais
    Alshamsi, Hamdan
    Ahmed, Ashfaq
    Shoufan, Abdulhadi
    2023 IFIP/IEEE 31ST INTERNATIONAL CONFERENCE ON VERY LARGE SCALE INTEGRATION, VLSI-SOC, 2023, : 27 - 31
  • [6] Toward Zero-Trust Security for the Metaverse
    Cheng, Ruizhi
    Chen, Songqing
    Han, Bo
    IEEE COMMUNICATIONS MAGAZINE, 2024, 62 (02) : 156 - 162
  • [7] Exploiting blockchain for dependable services in zero-trust vehicular networks
    Hao, Min
    Tan, Beihai
    Wang, Siming
    Yu, Rong
    Liu, Ryan Wen
    Yu, Lisu
    FRONTIERS OF COMPUTER SCIENCE, 2024, 18 (02)
  • [8] Exploiting blockchain for dependable services in zero-trust vehicular networks
    Min Hao
    Beihai Tan
    Siming Wang
    Rong Yu
    Ryan Wen Liu
    Lisu Yu
    Frontiers of Computer Science, 2024, 18
  • [9] Zero-Trust for the System Design Lifecycle
    Van Bossuyt, Douglas L.
    Hale, Britta
    Arlitt, Ryan
    Papakonstantinou, Nikolaos
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2023, 23 (06)
  • [10] SDP Based Zero-Trust Architectures
    Nair, Suku
    PROCEEDINGS OF THE 2022 ACM INTERNATIONAL WORKSHOP ON SECURITY AND PRIVACY ANALYTICS (IWSPA '22), 2022, : 1 - 1