Grid Computing, IEEE/ACM International Workshop on (2011)
Sept. 21, 2011 to Sept. 23, 2011
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/Grid.2011.23
Proxy Credentials serve as a principal for authentication and authorization in the Grid. Despite their limited lifetime, they can be intercepted and abused by an attacker. We counter this threat by enabling Grid users to track their credentials' use in Grid infrastructures, reporting all authentication and delegation operations to an auditing service. Our approach combines modifications to the security infrastructure with a Bayesian classifier in order to provide a reliable method for detecting abusive Grid credential usage and alerting the legitimate user. To validate this approach we created an extensive Grid simulation, simulating different types of legitimate and illegitimate use of credentials. Our experiments show that we can detect 99.5% of all abuse and our solution can thus help to increase security in the Grid.
Grid Computing, Proxy Credentials, Auditing, Abuse Detection, Bayesian Classifiers
N. Tahmasebi, T. Risse, M. Smith and C. Kunz, "Detecting Credential Abuse in the Grid Using Bayesian Networks," 2011 12th IEEE/ACM International Conference on Grid Computing(GRID), Lyon, 2011, pp. 114-120.