Skip to main navigation Skip to search Skip to main content

Dynamic Transmission Scheduling Method for High-Concurrent Zero Trust Access Control

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In remote work environments, once account authentication is completed, users can continue accessing confidential data without their authenticity verification (proof of being the legitimate user with proper access rights). This poses a risk when the device or authentication credentials are hijacked by attackers after authentication, the authenticity becomes compromised. To address this, Zero Trust Access Control (ZTAC) monitors and utilizes behavior information unique to each user without trusting any access requests, enabling access control while continuously ensuring user authenticity after authentication. However, collecting behavioral information necessary for user authenticity verification creates a critical trade-off: more detailed monitoring increases traffic load, necessitating longer intervals between behavior information updates. These extended intervals create security vulnerabilities, as modern ransomware can complete lateral movement within minutes, potentially exploiting these update gaps when the system cannot respond quickly enough. In this paper, we propose a highly concurrent ZTAC architecture to address this challenge. Our system dynamically schedules monitoring intervals based on real-time network status and concurrent connection load, shortening transmission intervals when suspicious behavior is detected to intensify behavioral monitoring. However, this approach can lead to false positives, thus our verification process introduces temporary blocking as an intermediate state between permission and denial. By allowing access after a short waiting period, we minimize false detections while effectively delaying lateral movement by adversaries. Through implementation and evaluation experiments, we demonstrated that our proposed system reduced processing time in high-concurrency environments with over 10,000 concurrent connections and effectively detected and prevented unauthorized access attempts while maintaining operational efficiency.

Original languageEnglish
Title of host publicationAvailability, Reliability and Security - ARES 2025 International Workshops, Proceedings
EditorsBart Coppens, Bruno Volckaert, Bjorn De Sutter, Vincent Naessens
PublisherSpringer Science and Business Media Deutschland GmbH
Pages324-341
Number of pages18
ISBN (Print)9783032006325
DOIs
Publication statusPublished - 1 Jan 2025
EventInternational Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025 - Ghent, Belgium
Duration: 11 Aug 202514 Aug 2025

Publication series

NameLecture Notes in Computer Science
Volume15995 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025
Country/TerritoryBelgium
CityGhent
Period11/08/2514/08/25

Keywords

  • Access Control
  • Single Packet Authorization
  • Transmission Scheduling
  • Zero Trust

Fingerprint

Dive into the research topics of 'Dynamic Transmission Scheduling Method for High-Concurrent Zero Trust Access Control'. Together they form a unique fingerprint.

Cite this