Human-centric network security management: a comprehensive helper

  • Authors:
  • Ghita Kouadri Mostéfaoui;Patrick Brézillon

  • Affiliations:
  • Fribourg University, Switzerland;Université Pierre et Marie Curie, France

  • Venue:
  • WMASH '06 Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In most current systems, managing access to networks rely on static rules implemented on firewalls and IDS (Intrusion Detection Systems). These measures lack a systematic consideration of the context within which an attack occurs. Indeed, we argue that network access management must be enforced by identifying the sensible contexts in which the hacker tries to drive the system to, before performing the potential dangerous action. Thus, our claim concerns a human-centered management of security as opposed to computing-centered security. In this direction, we propose a visual model that allows expressing sensible contexts for blocking hackers when they enter such sensible contexts. This surveillance operation could be lead by a human or a system. Additionally, our solution allows interlocked processes of incremental acquisition of knowledge and learning of new practices that enriches the initial security policy with new security contexts.