Passer à la navigation principale Passer à la recherche Passer au contenu principal

Dynamic Transmission Scheduling Method for High-Concurrent Zero Trust Access Control

Résultats de recherche: Le chapitre dans un livre, un rapport, une anthologie ou une collectionContribution à une conférenceRevue par des pairs

Résumé

In remote work environments, once account authentication is completed, users can continue accessing confidential data without their authenticity verification (proof of being the legitimate user with proper access rights). This poses a risk when the device or authentication credentials are hijacked by attackers after authentication, the authenticity becomes compromised. To address this, Zero Trust Access Control (ZTAC) monitors and utilizes behavior information unique to each user without trusting any access requests, enabling access control while continuously ensuring user authenticity after authentication. However, collecting behavioral information necessary for user authenticity verification creates a critical trade-off: more detailed monitoring increases traffic load, necessitating longer intervals between behavior information updates. These extended intervals create security vulnerabilities, as modern ransomware can complete lateral movement within minutes, potentially exploiting these update gaps when the system cannot respond quickly enough. In this paper, we propose a highly concurrent ZTAC architecture to address this challenge. Our system dynamically schedules monitoring intervals based on real-time network status and concurrent connection load, shortening transmission intervals when suspicious behavior is detected to intensify behavioral monitoring. However, this approach can lead to false positives, thus our verification process introduces temporary blocking as an intermediate state between permission and denial. By allowing access after a short waiting period, we minimize false detections while effectively delaying lateral movement by adversaries. Through implementation and evaluation experiments, we demonstrated that our proposed system reduced processing time in high-concurrency environments with over 10,000 concurrent connections and effectively detected and prevented unauthorized access attempts while maintaining operational efficiency.

langue originaleAnglais
titreAvailability, Reliability and Security - ARES 2025 International Workshops, Proceedings
rédacteurs en chefBart Coppens, Bruno Volckaert, Bjorn De Sutter, Vincent Naessens
EditeurSpringer Science and Business Media Deutschland GmbH
Pages324-341
Nombre de pages18
ISBN (imprimé)9783032006325
Les DOIs
étatPublié - 1 janv. 2025
EvénementInternational Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025 - Ghent, Belgique
Durée: 11 août 202514 août 2025

Série de publications

NomLecture Notes in Computer Science
Volume15995 LNCS
ISSN (imprimé)0302-9743
ISSN (Electronique)1611-3349

Une conférence

Une conférenceInternational Workshops on Availability, Reliability and Security, held under the umbrella of the 20th International conference on Availability, Reliability and Security, ARES 2025
Pays/TerritoireBelgique
La villeGhent
période11/08/2514/08/25

Empreinte digitale

Examiner les sujets de recherche de « Dynamic Transmission Scheduling Method for High-Concurrent Zero Trust Access Control ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation