Accepting the inevitable: factoring the user into home computer security

  • Authors:
  • Malgorzata Urbanska;Mark Roberts;Indrajit Ray;Adele Howe;Zinta Byrne

  • Affiliations:
  • Colorado State University, Fort Collins, CO, USA;Colorado State University, Fort Collins, CO, USA;Colorado State University, Fort Collins, CO, USA;Colorado State University, Fort Collins, CO, USA;Colorado State University, Fort Collins, CO, USA

  • Venue:
  • Proceedings of the third ACM conference on Data and application security and privacy
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

Home computer users present unique challenges to computer security. A user's actions frequently affect security without the user understanding how. Moreover, whereas some home users are quite adept at protecting their machines from security threats, a vast majority are not. Current generation security tools, unfortunately, do not tailor security to the home user's needs and actions. In this work, we propose Personalized Attack Graphs (PAG) as a formal technique to model the security risks for the home computer informed by a profile of the user attributes such as preferences, threat perceptions and activities. A PAG also models the interplay between user activities and preferences, attacker strategies, and system activities within the system risk model. We develop a formal model of a user profile to personalize a single, monolithic PAG to different users, and show how to use the user profile to predict user actions.