Muses poster4evostar2013

Preview:

Citation preview

Multiplatform Usable Multiplatform Usable

The overall purpose of MUSES isThe overall purpose of MUSES is

by reducing the risks introducedby reducing the risks introduced

Most corporate security incidents are caused by organizationMost corporate security incidents are caused by organization

malicious behaviour.

MUSES will provide a device independent, user-centric and selfMUSES will provide a device independent, user-centric and self

concept of seamless working experience on different devices, in

follow up the process on different ones, without corporate digitalfollow up the process on different ones, without corporate digital

MUSES aims at the benefit of the company

Evolutionary Computation will be used in Evolutionary Computation will be used in

User modelling with models optimised to match

observations using EC.observations using EC.

MUSES will try to create a model of users and

their context so that behaviours that can lead totheir context so that behaviours that can lead to

security problems can be previewed and, if

possible, avoided. These user models will dependpossible, avoided. These user models will depend

on observations of the context, but also will

employ heuristics to match them to known non-employ heuristics to match them to known non-

safe behaviours. EC will be used as asafe behaviours. EC will be used as a

metaheuristic to obtain optimal models

matching reality.matching reality.

MUSES partners

S2 Grupo (ES), Universidad de Granada (ES), HITEC (DE), Un

MUSES partners

S2 Grupo (ES), Universidad de Granada (ES), HITEC (DE), Un

Engineering – CURE (AT), Wind Telecomunicazioni (IT), TXT e-so

Project No. 318508 FP7-ICT-2011-8Project No. 318508 FP7-ICT-2011-8

MUSES Budget: 4.76M€

EU Funding: 3.59M€

Contact: Anna I. Esparcia – aesparcia@s2grupo.es

Usable Endpoint Security

Contact: Anna I. Esparcia – aesparcia@s2grupo.es

JJ Merelo – jmerelo@geneura.ugr.es

Usable Endpoint Security

is to foster corporate securityis to foster corporate security

introduced by user behaviourintroduced by user behaviour

insiders, either by their lack of knowledge or inadequate orinsiders, either by their lack of knowledge or inadequate or

self-adaptive corporate security system, able to cope with theself-adaptive corporate security system, able to cope with the

in which a user may start a session on a device and location and

digital asset loss.digital asset loss.

company, but focusing on the user

will be used in MUSES in two different contexts:will be used in MUSES in two different contexts:

Complex Event Processing using EC so that the

underlying mechanisms can be found out.underlying mechanisms can be found out.

In some cases, and independently of specific user

behaviour, sequences of actions might lead tobehaviour, sequences of actions might lead to

possible security failures. Complex Event

Processing captures these sequences in real timeProcessing captures these sequences in real time

and tries to model them so that the next action

can be foreseen. To create these models, EC willcan be foreseen. To create these models, EC will

be applied also in conjunction with otherbe applied also in conjunction with other

heuristics.

Université de Genève (CH), Center for Usability Research &Université de Genève (CH), Center for Usability Research &

solutions (IT), KU Leuven (BE) and Sweden Connectivity (SE).