A security architecture for computational grids
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Application of Bayesian Network in Power Grid Fault Diagnosis
ICNC '08 Proceedings of the 2008 Fourth International Conference on Natural Computation - Volume 01
A Concept for Grid Credential Lifecycle Management and Heuristic Credential Abuse Detection
ICNS '09 Proceedings of the 2009 Fifth International Conference on Networking and Services
A Streaming Intrusion Detection System for Grid Computing Environments
HPCC '09 Proceedings of the 2009 11th IEEE International Conference on High Performance Computing and Communications
The WEKA data mining software: an update
ACM SIGKDD Explorations Newsletter
Detecting spam bots in online social networking sites: a machine learning approach
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Induction of selective Bayesian classifiers
UAI'94 Proceedings of the Tenth international conference on Uncertainty in artificial intelligence
Hi-index | 0.00 |
Proxy Credentials serve as a principal for authentication and authorization in the Grid. Despite their limited lifetime, they can be intercepted and abused by an attacker. We counter this threat by enabling Grid users to track their credentials' use in Grid infrastructures, reporting all authentication and delegation operations to an auditing service. Our approach combines modifications to the security infrastructure with a Bayesian classifier in order to provide a reliable method for detecting abusive Grid credential usage and alerting the legitimate user. To validate this approach we created an extensive Grid simulation, simulating different types of legitimate and illegitimate use of credentials. Our experiments show that we can detect 99.5% of all abuse and our solution can thus help to increase security in the Grid.