SlideShare a Scribd company logo
1 of 28
Download to read offline
Project No. 318508 FP7-ICT-2011-8
A corporate user-centric system
which applies
computational intelligence methods
Antonio Mora, Paloma de las Cuevas, J.J. Merelo
Sergio Zamarripa, Anna I. Esparcia, Miguel Juan
Markus Burvall, Henrik Arfwedson
Zardost Hodaie
The 29th Annual ACM Symposium on Applied Computing, SAC 2014
Track on Trust, Reputation, Evidence and other Collaboration Know-how
(TRECK 2014)
Gyeongju (Korea) - 25 March 2014
• MUSES Project Aims.
• Architecture Overview.
• Client Architecture.
• Server Architecture.
• Example
• Self-adaptive Event Correlation.
Index
2 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
Why? - Motivation
• Perception of the user as “the enemy” in corporate
security.
• Users’ perception of security as a hindrance.
• Need to engage users in security issues:
– in a friendly way
– respecting their privacy
– increasing their trust
• New challenges: multiple devices, mobility, BYOD policies,
vanishing borders between personal & work
environments…
3 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
What? - Solution
• A corporate security system that is
– device independent
– user-centric
– self-adaptive
– able to analyse risk and trust in real time
– multiplatform
– open source
• Takes into account the corporate, technical, legal,
social and economic contexts.
4 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
Architecture Overview
5 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
• High computational power will be needed:
– Real-Time Event Correlation + Risk and Trust analysis.
– Data mining and Computational Intelligence methods.
• There are two different sides in the system:
– Mobile and portable devices (client).
– Enterprise (server).
Client/Server Rationale
6 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
Architecture Overview
Web
MUSES ClientMUSES Server
Secure Channel
HTTPS / REST / Web Service
Connection
Manager
Connection
Manager
7 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
• Online (device can connect with the MUSES server):
– It is possible to request the server to make a decision.
• Offline (device cannot connect with the MUSES server):
– All the decisions should be made in the device.
– The information gathered should be stored for later
submission (when a connection is available).
Working Modes
8 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
General Architecture Overview
9 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
Client Architecture
MUSES Client Connection
Manager
10 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
Client Architecture. Modules
z
MUSES
Aware App
Non MUSES
aware
App
OS
MUSES
User
Interface
Access Control
System
(MusACS)
Device
Monitor (MusDM)
Local Database
Info DB
Info SS
Info M
Info CT
Info U
Info UInfo AP
Info AP
Info SS*
Connection
Manager
Info D
External
Communications
Internal
Communications
Developed by
MUSES
Not entirely
developed by
MUSES
Info OS
11
Client Architecture. Submodules
Security Policy
Receiver
MUSES
Aware App
Non MUSES
aware
App
OS
MUSES
User
Interface
MusACS
User, Context,
Event Handler
Decision
Maker
MusDM
Local Database
Event Cache
Decision Table
Local Security
Info DB
Info D
Info SS
Info D
User Context Monitoring
System Actuator
Info M
Info CT
Info DC
Info U
Info UInfo AP
Info U
Info OS
Info SS*
Connection
Manager
External
Communications
Internal
Communications
Developed by
MUSES
Not entirely
developed by
MUSES
12
Server Architecture
MUSES Server
Connection
Manager
13 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
Server Architecture. Modules
Security
Policies/Risk
Management
Info PV
Info PD
Privacy
Enhancing
System
Info SS
User, Context,
Event
Data Receiver
Info DB Info M Info DB-RT
Info SS*
Info M
DATABASE
Enterprise
Security
Log
Security
Rules
Event
Correlation
User
Behaviour
Trust Data
and
Profiles
Connection
Manager
Info KN Info DB
Knowledge Refinement System
(MusKRS)
Continuous Real-Time Event Processor
(MusCRTEP)
RT2AE
(Real Time - Risk
and Trust
Analysis Engine)
External
Communications
Internal
Communications
Developed by
MUSES
Not entirely
developed by
MUSES
14
Server Architecture. Submodules
Security
Policies/Risk
Management
Info PV
Info PD
Privacy
Enhancing
System
Info SS
User, Context,
Event
Data Receiver
Info DB Info M Info DB-RT
Info SS*
MusKRS
Knowledge
Compiler
Data
Miner
Info DM
MusCRTEP
Event
Processor
RT2AE Policy Selector
Policy Transmitter
Info E
Info D
Info M
DATABASE
Enterprise
Security
Log
Security
Rules
Event
Correlation
User
Behaviour
Trust Data
and
Profiles
Connection
Manager
Info RT
Info KN Info DB
External
Communications
Internal
Communications
Developed by
MUSES
Not entirely
developed by
MUSES
15
16
Web
User’s DeviceCompany Server
Non-Secure Connection Connection
Manager
Connection
Manager
Workflow Example:
Attempt to upload file via a non-secure connection
SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
vSystem Actuator
Event Cache
Local Security
Workflow Example:
Attempt to upload file using a MUSES-aware application via a non-secure connection
Security Policy
Receiver
Non MUSES
aware
App
OS
MUSES
User
Interface
MusACS
Decision
Maker
MusDM
Local Database
Decision Table
Connection
Manager
User, Context,
Event Handler
User Context Monitoring
MUSES
Aware App
17
vSystem Actuator
Event Cache
Local Security
Workflow Example:
Attempt to upload file using a MUSES-aware application via a non-secure connection
Security Policy
Receiver
Non MUSES
aware
App
OS
MUSES
User
Interface
MusACS
Decision
Maker
MusDM
Local Database
Decision Table
Connection
Manager
User, Context,
Event Handler
User Context Monitoring
MUSES
Aware App
18
Security
Policies/Risk
Management
Privacy
Enhancing
System
MusKRS
Knowledge
Compiler
Data
Miner
MusCRTEP
RT2AE Policy Selector
Policy Transmitter
DATABASE
Enterprise
Security
Log
Security
Rules
Event
Correlation
User
Behaviour
Trust Data
and
Profiles
Connection
Manager
User, Context,
Event
Data Receiver
Workflow Example:
Attempt to upload file using a MUSES-aware application via a non-secure connection
Event
Processor
19
g
Security
Policies/Risk
Management
Privacy
Enhancing
System
MusKRS
Knowledge
Compiler
Data
Miner
MusCRTEP
Event
Processor
RT2AE Policy Selector
Policy Transmitter
DATABASE
Enterprise
Security
Log
Security
Rules
Event
Correlation
User
Behaviour
Trust Data
and
Profiles
Connection
Manager
User, Context,
Event
Data Receiver
Workflow Example:
Attempt to upload file using a MUSES-aware application via a non-secure connection
20
Event Cache
Local Security
v
User Context Monitoring
MUSES
Aware App
Non MUSES
aware
App
OS
MUSES
User
Interface
MusACS MusDM
Local Database
Decision Table
Connection
Manager
System Actuator
Security Policy
Receiver
Workflow Example:
Attempt to upload file using a MUSES-aware application via a non-secure connection
User, Context,
Event Handler
Decision
Maker
21
v
User Context Monitoring
Local Security
Event Cache
Security Policy
Receiver
MUSES
Aware App
Non MUSES
aware
App
OS
MUSES
User
Interface
MusACS MusDM
Local Database
Decision Table
Connection
Manager
User, Context,
Event Handler
System Actuator
Workflow Example:
Attempt to upload file using a MUSES-aware application via a non-secure connection
Decision
Maker
22
Self-adaptive Event Correlation
23 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
Rule refinement example
– Application: Corporate application that takes pictures and
it uploads them to a server.
– Policy: Any employee of the company is allowed to take
and upload pictures to corporate servers, only using
corporate applications.
– Long term observation: If the application is used outside of
the building, some security risks are observed.
– Proposed refined rules would require stronger
authentication depending on location, to allow uploading
pictures
24 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
Conceptual model (1)
Initial
rules
Data
mining
Rule
refinement
Rule
adjustment
Evaluation
25 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
Conceptual model (2)
Knowledge
Compiler
Data
Miner
KRS
BigData
Event Processor
Policy Selector
Refined rules
Event Event Event
RT2AE
26 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
• Data Miner:
– Classification assign classes to new patterns.
– Clustering  group similar patterns (search for anomalous)
– Feature Selection  remove less significant variables.
– Data Visualization  show data information for a controller
• Knowledge Compiler:
– Adapt existing rules adjust them to improve the pattern covering
(Evolutionary Algorithms).
– Infer/create new rules  to deal with new detected situations
(Genetic Programming).
Knowledge Refinement System
27 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
THANK YOU!
QUESTIONS?
Knowledge Refinement System
28 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014

More Related Content

What's hot

Enterprise Architecture and Information Security
Enterprise Architecture and Information SecurityEnterprise Architecture and Information Security
Enterprise Architecture and Information SecurityJohn Macasio
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...IRJET Journal
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceIJCSES Journal
 
The NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingThe NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingAlexis Blandin
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Editor IJCATR
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudPaaSword EU Project
 
Predictive cyber security
Predictive cyber securityPredictive cyber security
Predictive cyber securitycsandit
 
Privacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial SystemPrivacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial Systemiosrjce
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solutionSchneider Electric India
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetDevaraj Sl
 
An analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networksAn analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networkscsandit
 
The authenticated network architecture
The authenticated network architectureThe authenticated network architecture
The authenticated network architectureMotty Ben Atia
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresMohammed Saqib
 

What's hot (15)

Enterprise Architecture and Information Security
Enterprise Architecture and Information SecurityEnterprise Architecture and Information Security
Enterprise Architecture and Information Security
 
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
Secure Channel Establishment Techniques for Homomorphic Encryption in Cloud C...
 
Firewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performanceFirewall and vpn investigation on cloud computing performance
Firewall and vpn investigation on cloud computing performance
 
The NIST Definition of Cloud Computing
The NIST Definition of Cloud ComputingThe NIST Definition of Cloud Computing
The NIST Definition of Cloud Computing
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
A Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the CloudA Survey on Context Security Policies in the Cloud
A Survey on Context Security Policies in the Cloud
 
Predictive cyber security
Predictive cyber securityPredictive cyber security
Predictive cyber security
 
Securing Networked Infrastructure for the Energy Sector
Securing Networked Infrastructure for the Energy SectorSecuring Networked Infrastructure for the Energy Sector
Securing Networked Infrastructure for the Energy Sector
 
Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
 
Privacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial SystemPrivacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial System
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution
 
Tripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheetTripwire enterprise 87_datasheet
Tripwire enterprise 87_datasheet
 
An analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networksAn analysis of security challenges in mobile ad hoc networks
An analysis of security challenges in mobile ad hoc networks
 
The authenticated network architecture
The authenticated network architectureThe authenticated network architecture
The authenticated network architecture
 
Cloud computing security- critical infrastructures
Cloud computing security- critical infrastructuresCloud computing security- critical infrastructures
Cloud computing security- critical infrastructures
 

Viewers also liked

Publicación de imágenes en la web
Publicación de imágenes en la webPublicación de imágenes en la web
Publicación de imágenes en la webAntonio Mora
 
GPUs para Científicos
GPUs para CientíficosGPUs para Científicos
GPUs para CientíficosAntonio Mora
 
Sólo puede quedar uno: Evolución de Bots para RTS basada en supervivencia
Sólo puede quedar uno: Evolución de Bots para RTS basada en supervivenciaSólo puede quedar uno: Evolución de Bots para RTS basada en supervivencia
Sólo puede quedar uno: Evolución de Bots para RTS basada en supervivenciaAntonio Mora
 
Living-UGR: Una aventura gráfica geolocalizada para difundir el patrimonio de...
Living-UGR: Una aventura gráfica geolocalizada para difundir el patrimonio de...Living-UGR: Una aventura gráfica geolocalizada para difundir el patrimonio de...
Living-UGR: Una aventura gráfica geolocalizada para difundir el patrimonio de...Antonio Mora
 
A Study of Parallel Approaches in MOACOs for solving the Bicriteria TSP
A Study of Parallel Approaches in MOACOs for solving the Bicriteria TSPA Study of Parallel Approaches in MOACOs for solving the Bicriteria TSP
A Study of Parallel Approaches in MOACOs for solving the Bicriteria TSPAntonio Mora
 
Evolving the Cooperative Behaviour in Unreal Bots
Evolving the Cooperative Behaviour in Unreal BotsEvolving the Cooperative Behaviour in Unreal Bots
Evolving the Cooperative Behaviour in Unreal BotsAntonio Mora
 
Gamification in Teaching - How to motivate students through games
Gamification in Teaching - How to motivate students through gamesGamification in Teaching - How to motivate students through games
Gamification in Teaching - How to motivate students through gamesAntonio Mora
 
Optimización basada en colonias de hormigas. Conceptos principales
Optimización basada en colonias de hormigas. Conceptos principalesOptimización basada en colonias de hormigas. Conceptos principales
Optimización basada en colonias de hormigas. Conceptos principalesAntonio Mora
 
Migration study on a Pareto-based island model for MOACOs
Migration study on a Pareto-based island model for MOACOsMigration study on a Pareto-based island model for MOACOs
Migration study on a Pareto-based island model for MOACOsAntonio Mora
 
Modelling Human Expert Behaviour in an Unreal Tournament 2004 Bot
Modelling Human Expert Behaviour in an Unreal Tournament 2004 BotModelling Human Expert Behaviour in an Unreal Tournament 2004 Bot
Modelling Human Expert Behaviour in an Unreal Tournament 2004 BotAntonio Mora
 
Designing and Evolving an Unreal Tournament 2004 Expert Bot
Designing and Evolving an Unreal Tournament 2004 Expert BotDesigning and Evolving an Unreal Tournament 2004 Expert Bot
Designing and Evolving an Unreal Tournament 2004 Expert BotAntonio Mora
 
Evolving Evil: Optimizing Flocking Strategies through Genetic Algorithms for ...
Evolving Evil: Optimizing Flocking Strategies through Genetic Algorithms for ...Evolving Evil: Optimizing Flocking Strategies through Genetic Algorithms for ...
Evolving Evil: Optimizing Flocking Strategies through Genetic Algorithms for ...Antonio Mora
 
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]Antonio Mora
 

Viewers also liked (13)

Publicación de imágenes en la web
Publicación de imágenes en la webPublicación de imágenes en la web
Publicación de imágenes en la web
 
GPUs para Científicos
GPUs para CientíficosGPUs para Científicos
GPUs para Científicos
 
Sólo puede quedar uno: Evolución de Bots para RTS basada en supervivencia
Sólo puede quedar uno: Evolución de Bots para RTS basada en supervivenciaSólo puede quedar uno: Evolución de Bots para RTS basada en supervivencia
Sólo puede quedar uno: Evolución de Bots para RTS basada en supervivencia
 
Living-UGR: Una aventura gráfica geolocalizada para difundir el patrimonio de...
Living-UGR: Una aventura gráfica geolocalizada para difundir el patrimonio de...Living-UGR: Una aventura gráfica geolocalizada para difundir el patrimonio de...
Living-UGR: Una aventura gráfica geolocalizada para difundir el patrimonio de...
 
A Study of Parallel Approaches in MOACOs for solving the Bicriteria TSP
A Study of Parallel Approaches in MOACOs for solving the Bicriteria TSPA Study of Parallel Approaches in MOACOs for solving the Bicriteria TSP
A Study of Parallel Approaches in MOACOs for solving the Bicriteria TSP
 
Evolving the Cooperative Behaviour in Unreal Bots
Evolving the Cooperative Behaviour in Unreal BotsEvolving the Cooperative Behaviour in Unreal Bots
Evolving the Cooperative Behaviour in Unreal Bots
 
Gamification in Teaching - How to motivate students through games
Gamification in Teaching - How to motivate students through gamesGamification in Teaching - How to motivate students through games
Gamification in Teaching - How to motivate students through games
 
Optimización basada en colonias de hormigas. Conceptos principales
Optimización basada en colonias de hormigas. Conceptos principalesOptimización basada en colonias de hormigas. Conceptos principales
Optimización basada en colonias de hormigas. Conceptos principales
 
Migration study on a Pareto-based island model for MOACOs
Migration study on a Pareto-based island model for MOACOsMigration study on a Pareto-based island model for MOACOs
Migration study on a Pareto-based island model for MOACOs
 
Modelling Human Expert Behaviour in an Unreal Tournament 2004 Bot
Modelling Human Expert Behaviour in an Unreal Tournament 2004 BotModelling Human Expert Behaviour in an Unreal Tournament 2004 Bot
Modelling Human Expert Behaviour in an Unreal Tournament 2004 Bot
 
Designing and Evolving an Unreal Tournament 2004 Expert Bot
Designing and Evolving an Unreal Tournament 2004 Expert BotDesigning and Evolving an Unreal Tournament 2004 Expert Bot
Designing and Evolving an Unreal Tournament 2004 Expert Bot
 
Evolving Evil: Optimizing Flocking Strategies through Genetic Algorithms for ...
Evolving Evil: Optimizing Flocking Strategies through Genetic Algorithms for ...Evolving Evil: Optimizing Flocking Strategies through Genetic Algorithms for ...
Evolving Evil: Optimizing Flocking Strategies through Genetic Algorithms for ...
 
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
Ciencia y videojuegos (versión Extracción de Información) [UCA 05/2015]
 

Similar to MUSES: A Corporate User-Centric System which Applies Computational Intelligence Methods

Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesIRJET Journal
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET Journal
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET Journal
 
A New Approach for CBIR – A Review
A New Approach for CBIR – A ReviewA New Approach for CBIR – A Review
A New Approach for CBIR – A ReviewIRJET Journal
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
Classification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceClassification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceIRJET Journal
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...IRJET Journal
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud allan sam
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmIRJET Journal
 
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...cscpconf
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET Journal
 
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsIRJET Journal
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET Journal
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyIRJET Journal
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesIRJET Journal
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RIRJET Journal
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET Journal
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...IRJET Journal
 

Similar to MUSES: A Corporate User-Centric System which Applies Computational Intelligence Methods (20)

Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud ComputingIRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
IRJET- Compress and Secure Data Sharing for Mobile Cloud Computing
 
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
IRJET- An Efficient Data Sharing Scheme in Mobile Cloud Computing using Attri...
 
A New Approach for CBIR – A Review
A New Approach for CBIR – A ReviewA New Approach for CBIR – A Review
A New Approach for CBIR – A Review
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
Classification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of ServiceClassification of Software Defined Network Traffic to provide Quality of Service
Classification of Software Defined Network Traffic to provide Quality of Service
 
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...IRJET-  	  Model-Driven Platform for Service Security and Framework for Data ...
IRJET- Model-Driven Platform for Service Security and Framework for Data ...
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic AlgorithmCloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
Cloud Computing Task Scheduling Algorithm Based on Modified Genetic Algorithm
 
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
 
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service ProvidersIRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
IRJET- Extended Cloud Security for Trust-Based Cloud Service Providers
 
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical SystemsUpsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
Upsurging Cyber-Kinetic attacks in Mobile Cyber Physical Systems
 
IRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence ApproachIRJET- Analysis of using Software Defined and Service Coherence Approach
IRJET- Analysis of using Software Defined and Service Coherence Approach
 
Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
 
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and RSvm Classifier Algorithm for Data Stream Mining Using Hive and R
Svm Classifier Algorithm for Data Stream Mining Using Hive and R
 
IRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key ExposureIRJET- Securing Cloud Data Under Key Exposure
IRJET- Securing Cloud Data Under Key Exposure
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 

More from Antonio Mora

Study on Genetic Algorithm Approaches to Improve an Autonomous Agent for a Fi...
Study on Genetic Algorithm Approaches to Improve an Autonomous Agent for a Fi...Study on Genetic Algorithm Approaches to Improve an Autonomous Agent for a Fi...
Study on Genetic Algorithm Approaches to Improve an Autonomous Agent for a Fi...Antonio Mora
 
Optimización Adaptativa basada en Colonias de Hormigas para la Composición de...
Optimización Adaptativa basada en Colonias de Hormigas para la Composición de...Optimización Adaptativa basada en Colonias de Hormigas para la Composición de...
Optimización Adaptativa basada en Colonias de Hormigas para la Composición de...Antonio Mora
 
Adaptive Ant Colony Optimization for Service Function Chaining in a Dynamic 5...
Adaptive Ant Colony Optimization for Service Function Chaining in a Dynamic 5...Adaptive Ant Colony Optimization for Service Function Chaining in a Dynamic 5...
Adaptive Ant Colony Optimization for Service Function Chaining in a Dynamic 5...Antonio Mora
 
Research in Videogames. (Much) further than just AI
Research in Videogames. (Much) further than just AIResearch in Videogames. (Much) further than just AI
Research in Videogames. (Much) further than just AIAntonio Mora
 
GRETIVE: Un Bot Evolutivo para HearthStone basado en Perfiles
GRETIVE: Un Bot Evolutivo para HearthStone basado en PerfilesGRETIVE: Un Bot Evolutivo para HearthStone basado en Perfiles
GRETIVE: Un Bot Evolutivo para HearthStone basado en PerfilesAntonio Mora
 
Improving the Performance of MCTS-Based μRTS Agents Through Move Pruning
Improving the Performance of MCTS-Based μRTS Agents Through Move PruningImproving the Performance of MCTS-Based μRTS Agents Through Move Pruning
Improving the Performance of MCTS-Based μRTS Agents Through Move PruningAntonio Mora
 
Testing hybrid computational intelligence algorithms for general game playing...
Testing hybrid computational intelligence algorithms for general game playing...Testing hybrid computational intelligence algorithms for general game playing...
Testing hybrid computational intelligence algorithms for general game playing...Antonio Mora
 
Checking the difficulty of evolutionary-generated maps in a N-Body inspired m...
Checking the difficulty of evolutionary-generated maps in a N-Body inspired m...Checking the difficulty of evolutionary-generated maps in a N-Body inspired m...
Checking the difficulty of evolutionary-generated maps in a N-Body inspired m...Antonio Mora
 
Applying Ant Colony Optimization for Service Function Chaining in a 5G Networ...
Applying Ant Colony Optimization for Service Function Chaining in a 5G Networ...Applying Ant Colony Optimization for Service Function Chaining in a 5G Networ...
Applying Ant Colony Optimization for Service Function Chaining in a 5G Networ...Antonio Mora
 
Investigación en videojuegos. (mucho) Mas allá de la IA
Investigación en videojuegos. (mucho) Mas allá de la IAInvestigación en videojuegos. (mucho) Mas allá de la IA
Investigación en videojuegos. (mucho) Mas allá de la IAAntonio Mora
 
Beating uncertainty in racing bot evolution through enhanced exploration and ...
Beating uncertainty in racing bot evolution through enhanced exploration and ...Beating uncertainty in racing bot evolution through enhanced exploration and ...
Beating uncertainty in racing bot evolution through enhanced exploration and ...Antonio Mora
 
Inteligencia Computacional en Videojuegos (Meetup GranadAI 2019)
Inteligencia Computacional en Videojuegos (Meetup GranadAI 2019)Inteligencia Computacional en Videojuegos (Meetup GranadAI 2019)
Inteligencia Computacional en Videojuegos (Meetup GranadAI 2019)Antonio Mora
 
Free Form Evolution for Angry Birds Level Generation
Free Form Evolution for Angry Birds Level GenerationFree Form Evolution for Angry Birds Level Generation
Free Form Evolution for Angry Birds Level GenerationAntonio Mora
 
Ciencia y Videojuegos (ULP 2019)
Ciencia y Videojuegos (ULP 2019)Ciencia y Videojuegos (ULP 2019)
Ciencia y Videojuegos (ULP 2019)Antonio Mora
 
The Evolutionary Race: Improving the Process of Evaluating Car Controllers in...
The Evolutionary Race: Improving the Process of Evaluating Car Controllers in...The Evolutionary Race: Improving the Process of Evaluating Car Controllers in...
The Evolutionary Race: Improving the Process of Evaluating Car Controllers in...Antonio Mora
 
Predicción de Quiebra Financiera de Empresas Mediante Equilibrado de Datos y ...
Predicción de Quiebra Financiera de Empresas Mediante Equilibrado de Datos y ...Predicción de Quiebra Financiera de Empresas Mediante Equilibrado de Datos y ...
Predicción de Quiebra Financiera de Empresas Mediante Equilibrado de Datos y ...Antonio Mora
 
Driving in TORCS using modular fuzzy controllers - Poster - EvoGAMES 2017
Driving in TORCS using modular fuzzy controllers - Poster - EvoGAMES 2017Driving in TORCS using modular fuzzy controllers - Poster - EvoGAMES 2017
Driving in TORCS using modular fuzzy controllers - Poster - EvoGAMES 2017Antonio Mora
 
Ciencia y Videojuegos (v2)
Ciencia y Videojuegos (v2)Ciencia y Videojuegos (v2)
Ciencia y Videojuegos (v2)Antonio Mora
 
FSM-Based Agents for Playing Super Mario Game
FSM-Based Agents for Playing Super Mario GameFSM-Based Agents for Playing Super Mario Game
FSM-Based Agents for Playing Super Mario GameAntonio Mora
 
Science and Videogames. Computational intelligence in videogames
Science and Videogames. Computational intelligence in videogamesScience and Videogames. Computational intelligence in videogames
Science and Videogames. Computational intelligence in videogamesAntonio Mora
 

More from Antonio Mora (20)

Study on Genetic Algorithm Approaches to Improve an Autonomous Agent for a Fi...
Study on Genetic Algorithm Approaches to Improve an Autonomous Agent for a Fi...Study on Genetic Algorithm Approaches to Improve an Autonomous Agent for a Fi...
Study on Genetic Algorithm Approaches to Improve an Autonomous Agent for a Fi...
 
Optimización Adaptativa basada en Colonias de Hormigas para la Composición de...
Optimización Adaptativa basada en Colonias de Hormigas para la Composición de...Optimización Adaptativa basada en Colonias de Hormigas para la Composición de...
Optimización Adaptativa basada en Colonias de Hormigas para la Composición de...
 
Adaptive Ant Colony Optimization for Service Function Chaining in a Dynamic 5...
Adaptive Ant Colony Optimization for Service Function Chaining in a Dynamic 5...Adaptive Ant Colony Optimization for Service Function Chaining in a Dynamic 5...
Adaptive Ant Colony Optimization for Service Function Chaining in a Dynamic 5...
 
Research in Videogames. (Much) further than just AI
Research in Videogames. (Much) further than just AIResearch in Videogames. (Much) further than just AI
Research in Videogames. (Much) further than just AI
 
GRETIVE: Un Bot Evolutivo para HearthStone basado en Perfiles
GRETIVE: Un Bot Evolutivo para HearthStone basado en PerfilesGRETIVE: Un Bot Evolutivo para HearthStone basado en Perfiles
GRETIVE: Un Bot Evolutivo para HearthStone basado en Perfiles
 
Improving the Performance of MCTS-Based μRTS Agents Through Move Pruning
Improving the Performance of MCTS-Based μRTS Agents Through Move PruningImproving the Performance of MCTS-Based μRTS Agents Through Move Pruning
Improving the Performance of MCTS-Based μRTS Agents Through Move Pruning
 
Testing hybrid computational intelligence algorithms for general game playing...
Testing hybrid computational intelligence algorithms for general game playing...Testing hybrid computational intelligence algorithms for general game playing...
Testing hybrid computational intelligence algorithms for general game playing...
 
Checking the difficulty of evolutionary-generated maps in a N-Body inspired m...
Checking the difficulty of evolutionary-generated maps in a N-Body inspired m...Checking the difficulty of evolutionary-generated maps in a N-Body inspired m...
Checking the difficulty of evolutionary-generated maps in a N-Body inspired m...
 
Applying Ant Colony Optimization for Service Function Chaining in a 5G Networ...
Applying Ant Colony Optimization for Service Function Chaining in a 5G Networ...Applying Ant Colony Optimization for Service Function Chaining in a 5G Networ...
Applying Ant Colony Optimization for Service Function Chaining in a 5G Networ...
 
Investigación en videojuegos. (mucho) Mas allá de la IA
Investigación en videojuegos. (mucho) Mas allá de la IAInvestigación en videojuegos. (mucho) Mas allá de la IA
Investigación en videojuegos. (mucho) Mas allá de la IA
 
Beating uncertainty in racing bot evolution through enhanced exploration and ...
Beating uncertainty in racing bot evolution through enhanced exploration and ...Beating uncertainty in racing bot evolution through enhanced exploration and ...
Beating uncertainty in racing bot evolution through enhanced exploration and ...
 
Inteligencia Computacional en Videojuegos (Meetup GranadAI 2019)
Inteligencia Computacional en Videojuegos (Meetup GranadAI 2019)Inteligencia Computacional en Videojuegos (Meetup GranadAI 2019)
Inteligencia Computacional en Videojuegos (Meetup GranadAI 2019)
 
Free Form Evolution for Angry Birds Level Generation
Free Form Evolution for Angry Birds Level GenerationFree Form Evolution for Angry Birds Level Generation
Free Form Evolution for Angry Birds Level Generation
 
Ciencia y Videojuegos (ULP 2019)
Ciencia y Videojuegos (ULP 2019)Ciencia y Videojuegos (ULP 2019)
Ciencia y Videojuegos (ULP 2019)
 
The Evolutionary Race: Improving the Process of Evaluating Car Controllers in...
The Evolutionary Race: Improving the Process of Evaluating Car Controllers in...The Evolutionary Race: Improving the Process of Evaluating Car Controllers in...
The Evolutionary Race: Improving the Process of Evaluating Car Controllers in...
 
Predicción de Quiebra Financiera de Empresas Mediante Equilibrado de Datos y ...
Predicción de Quiebra Financiera de Empresas Mediante Equilibrado de Datos y ...Predicción de Quiebra Financiera de Empresas Mediante Equilibrado de Datos y ...
Predicción de Quiebra Financiera de Empresas Mediante Equilibrado de Datos y ...
 
Driving in TORCS using modular fuzzy controllers - Poster - EvoGAMES 2017
Driving in TORCS using modular fuzzy controllers - Poster - EvoGAMES 2017Driving in TORCS using modular fuzzy controllers - Poster - EvoGAMES 2017
Driving in TORCS using modular fuzzy controllers - Poster - EvoGAMES 2017
 
Ciencia y Videojuegos (v2)
Ciencia y Videojuegos (v2)Ciencia y Videojuegos (v2)
Ciencia y Videojuegos (v2)
 
FSM-Based Agents for Playing Super Mario Game
FSM-Based Agents for Playing Super Mario GameFSM-Based Agents for Playing Super Mario Game
FSM-Based Agents for Playing Super Mario Game
 
Science and Videogames. Computational intelligence in videogames
Science and Videogames. Computational intelligence in videogamesScience and Videogames. Computational intelligence in videogames
Science and Videogames. Computational intelligence in videogames
 

Recently uploaded

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

MUSES: A Corporate User-Centric System which Applies Computational Intelligence Methods

  • 1. Project No. 318508 FP7-ICT-2011-8 A corporate user-centric system which applies computational intelligence methods Antonio Mora, Paloma de las Cuevas, J.J. Merelo Sergio Zamarripa, Anna I. Esparcia, Miguel Juan Markus Burvall, Henrik Arfwedson Zardost Hodaie The 29th Annual ACM Symposium on Applied Computing, SAC 2014 Track on Trust, Reputation, Evidence and other Collaboration Know-how (TRECK 2014) Gyeongju (Korea) - 25 March 2014
  • 2. • MUSES Project Aims. • Architecture Overview. • Client Architecture. • Server Architecture. • Example • Self-adaptive Event Correlation. Index 2 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 3. Why? - Motivation • Perception of the user as “the enemy” in corporate security. • Users’ perception of security as a hindrance. • Need to engage users in security issues: – in a friendly way – respecting their privacy – increasing their trust • New challenges: multiple devices, mobility, BYOD policies, vanishing borders between personal & work environments… 3 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 4. What? - Solution • A corporate security system that is – device independent – user-centric – self-adaptive – able to analyse risk and trust in real time – multiplatform – open source • Takes into account the corporate, technical, legal, social and economic contexts. 4 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 5. Architecture Overview 5 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 6. • High computational power will be needed: – Real-Time Event Correlation + Risk and Trust analysis. – Data mining and Computational Intelligence methods. • There are two different sides in the system: – Mobile and portable devices (client). – Enterprise (server). Client/Server Rationale 6 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 7. Architecture Overview Web MUSES ClientMUSES Server Secure Channel HTTPS / REST / Web Service Connection Manager Connection Manager 7 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 8. • Online (device can connect with the MUSES server): – It is possible to request the server to make a decision. • Offline (device cannot connect with the MUSES server): – All the decisions should be made in the device. – The information gathered should be stored for later submission (when a connection is available). Working Modes 8 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 9. General Architecture Overview 9 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 10. Client Architecture MUSES Client Connection Manager 10 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 11. Client Architecture. Modules z MUSES Aware App Non MUSES aware App OS MUSES User Interface Access Control System (MusACS) Device Monitor (MusDM) Local Database Info DB Info SS Info M Info CT Info U Info UInfo AP Info AP Info SS* Connection Manager Info D External Communications Internal Communications Developed by MUSES Not entirely developed by MUSES Info OS 11
  • 12. Client Architecture. Submodules Security Policy Receiver MUSES Aware App Non MUSES aware App OS MUSES User Interface MusACS User, Context, Event Handler Decision Maker MusDM Local Database Event Cache Decision Table Local Security Info DB Info D Info SS Info D User Context Monitoring System Actuator Info M Info CT Info DC Info U Info UInfo AP Info U Info OS Info SS* Connection Manager External Communications Internal Communications Developed by MUSES Not entirely developed by MUSES 12
  • 13. Server Architecture MUSES Server Connection Manager 13 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 14. Server Architecture. Modules Security Policies/Risk Management Info PV Info PD Privacy Enhancing System Info SS User, Context, Event Data Receiver Info DB Info M Info DB-RT Info SS* Info M DATABASE Enterprise Security Log Security Rules Event Correlation User Behaviour Trust Data and Profiles Connection Manager Info KN Info DB Knowledge Refinement System (MusKRS) Continuous Real-Time Event Processor (MusCRTEP) RT2AE (Real Time - Risk and Trust Analysis Engine) External Communications Internal Communications Developed by MUSES Not entirely developed by MUSES 14
  • 15. Server Architecture. Submodules Security Policies/Risk Management Info PV Info PD Privacy Enhancing System Info SS User, Context, Event Data Receiver Info DB Info M Info DB-RT Info SS* MusKRS Knowledge Compiler Data Miner Info DM MusCRTEP Event Processor RT2AE Policy Selector Policy Transmitter Info E Info D Info M DATABASE Enterprise Security Log Security Rules Event Correlation User Behaviour Trust Data and Profiles Connection Manager Info RT Info KN Info DB External Communications Internal Communications Developed by MUSES Not entirely developed by MUSES 15
  • 16. 16 Web User’s DeviceCompany Server Non-Secure Connection Connection Manager Connection Manager Workflow Example: Attempt to upload file via a non-secure connection SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 17. vSystem Actuator Event Cache Local Security Workflow Example: Attempt to upload file using a MUSES-aware application via a non-secure connection Security Policy Receiver Non MUSES aware App OS MUSES User Interface MusACS Decision Maker MusDM Local Database Decision Table Connection Manager User, Context, Event Handler User Context Monitoring MUSES Aware App 17
  • 18. vSystem Actuator Event Cache Local Security Workflow Example: Attempt to upload file using a MUSES-aware application via a non-secure connection Security Policy Receiver Non MUSES aware App OS MUSES User Interface MusACS Decision Maker MusDM Local Database Decision Table Connection Manager User, Context, Event Handler User Context Monitoring MUSES Aware App 18
  • 19. Security Policies/Risk Management Privacy Enhancing System MusKRS Knowledge Compiler Data Miner MusCRTEP RT2AE Policy Selector Policy Transmitter DATABASE Enterprise Security Log Security Rules Event Correlation User Behaviour Trust Data and Profiles Connection Manager User, Context, Event Data Receiver Workflow Example: Attempt to upload file using a MUSES-aware application via a non-secure connection Event Processor 19
  • 20. g Security Policies/Risk Management Privacy Enhancing System MusKRS Knowledge Compiler Data Miner MusCRTEP Event Processor RT2AE Policy Selector Policy Transmitter DATABASE Enterprise Security Log Security Rules Event Correlation User Behaviour Trust Data and Profiles Connection Manager User, Context, Event Data Receiver Workflow Example: Attempt to upload file using a MUSES-aware application via a non-secure connection 20
  • 21. Event Cache Local Security v User Context Monitoring MUSES Aware App Non MUSES aware App OS MUSES User Interface MusACS MusDM Local Database Decision Table Connection Manager System Actuator Security Policy Receiver Workflow Example: Attempt to upload file using a MUSES-aware application via a non-secure connection User, Context, Event Handler Decision Maker 21
  • 22. v User Context Monitoring Local Security Event Cache Security Policy Receiver MUSES Aware App Non MUSES aware App OS MUSES User Interface MusACS MusDM Local Database Decision Table Connection Manager User, Context, Event Handler System Actuator Workflow Example: Attempt to upload file using a MUSES-aware application via a non-secure connection Decision Maker 22
  • 23. Self-adaptive Event Correlation 23 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 24. Rule refinement example – Application: Corporate application that takes pictures and it uploads them to a server. – Policy: Any employee of the company is allowed to take and upload pictures to corporate servers, only using corporate applications. – Long term observation: If the application is used outside of the building, some security risks are observed. – Proposed refined rules would require stronger authentication depending on location, to allow uploading pictures 24 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 26. Conceptual model (2) Knowledge Compiler Data Miner KRS BigData Event Processor Policy Selector Refined rules Event Event Event RT2AE 26 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 27. • Data Miner: – Classification assign classes to new patterns. – Clustering  group similar patterns (search for anomalous) – Feature Selection  remove less significant variables. – Data Visualization  show data information for a controller • Knowledge Compiler: – Adapt existing rules adjust them to improve the pattern covering (Evolutionary Algorithms). – Infer/create new rules  to deal with new detected situations (Genetic Programming). Knowledge Refinement System 27 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014
  • 28. THANK YOU! QUESTIONS? Knowledge Refinement System 28 SAC 2014 – TRECK – Gyeongju (Korea) - 25 March 2014