Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework

08/04/2022
by   Jaimandeep Singh, et al.
0

In recent cyber attacks, credential theft has emerged as one of the primary vectors of gaining entry into the system. Once attacker(s) have a foothold in the system, they use various techniques including token manipulation to elevate the privileges and access protected resources. This makes authentication and token based authorization a critical component for a secure and resilient cyber system. In this paper we discuss the design considerations for such a secure and resilient authentication and authorization framework capable of self-adapting based on the risk scores and trust profiles. We compare this design with the existing standards such as OAuth 2.0, OpenID Connect and SAML 2.0. We then study popular threat models such as STRIDE and PASTA and summarize the resilience of the proposed architecture against common and relevant threat vectors. We call this framework as Resilient Risk based Adaptive Authentication and Authorization (RAD-AA). The proposed framework excessively increases the cost for an adversary to launch and sustain any cyber attack and provides much-needed strength to critical infrastructure. We also discuss the machine learning (ML) approach for the adaptive engine to accurately classify transactions and arrive at risk scores.

READ FULL TEXT
research
06/17/2019

A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network

Infrastructure networks are vulnerable to both cyber and physical attack...
research
01/25/2021

Cyber-Physical Energy Systems Security: Threat Modeling, Risk Assessment, Resources, Metrics, and Case Studies

Cyber-physical systems (CPS) are interconnected architectures that emplo...
research
05/03/2019

Enterprise Cyber Resiliency Against Lateral Movement: A Graph Theoretic Approach

Lateral movement attacks are a serious threat to enterprise security. In...
research
07/11/2019

REACT: REActive resilience for critical infrastructures using graph-Coloring Techniques

Nowadays society is more and more dependent on critical infrastructures....
research
07/11/2022

PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning

As the demand for highly secure and dependable lightweight systems incre...

Please sign up or login with your details

Forgot password? Click here to reset