Hi Pamoda,
Here are some of my thoughts, and not in order or organized.

User Behavior analytics (*UBA*)

   -

   Implement multi-dimensional clustering (this will detect general user
   behaviours. Not of an individual)
   -

   Implement clickstream analytics (This will have knowledge of individual,
   but keep the records indexed with UserID hash, so that, we can conform to
   GPDR)


Both above algorithms may be run on a separate JVM, (or a feature on top of
analytics). DAS will publish data to UBA. DAS will detect the fields in the
analytics dimensions, which can be configured by the end user (Identity
Admin).

   -

   This will cater 95% of UBA cases.
   -

   Events can be generated from IS well as any other application. E.g.
   Tomcat Filter, .Net Handler.
   -

   Self learning(or appears learning) *without ML.* Will be purely math
   based (statistics, and probability)
   -

   Automatic detection of new knowledge.



   -

   Uses DAS Siddhi. Should not use Spark.
   -

   Need to provide a gadget to visualize the clustered data and drill down.


Clickstream

   -

   Click stream analysis is done with probability matrix of time-correlated
   events.
   -

   We keep a matrix in memory per each user, backed by DB.
   -

   Updates done on memory copy and periodically synced to DB (since few
   lost events does not really make much difference in probability matrix).
   -

   HA can be done with sharding of UserID.



Analysis

   -

   Each event is sent to cluster analytics and clickstream analytics.
   -

   They will provide a result in a probability array of each type of
   anomaly.
   -

   Admin is given a UI to configure threshold of probability values, which
   he think important.
   -

   Admin can select an action(this is a Siddhi event publisher. One is to
   publish to JMS topic towards IS)
   -

   IS can decide upon authentication flow using its “Conditional
   Authentication in IS 5.5.0”


Cheers,
Ruwan

On Tue, Jan 16, 2018 at 9:09 AM, Pamoda Wimalasiri <[email protected]> wrote:

>
>
> On Tue, Jan 16, 2018 at 8:13 AM, Prakhash Sivakumar <[email protected]>
> wrote:
>
>> On Mon, Jan 15, 2018 at 8:28 PM, Dimuthu Leelarathne <[email protected]>
>> wrote:
>>
>>> Hi Pamoda,
>>>
>>> Authentication history is a broad term. How do we plan to identify
>>> exceptions?
>>>
>>
> As authentication history, we can consider
>
>    - number of consecutive invalid login attempts (as suggested by Johan)
>    - geo velocity: time and location of the previous successful login and
>    the current login.
>
>
>
>>
>>> thanks,
>>> Dimuthu
>>>
>>> On Mon, Jan 15, 2018 at 8:04 PM, Johann Nallathamby <[email protected]>
>>> wrote:
>>>
>>>> *[-IAM, RRT]*
>>>>
>>>> Apart from the business transaction value, following factors can be
>>>> considered for risk calculation.
>>>>
>>>> 1. Environment - IP, network, geographical location, time of the day,
>>>> device/OS/Device fingerprinting
>>>> 2. Context - Previous successful login time, consecutive invalid login
>>>> attempts followed by a successful attempt
>>>> 3. User behavior - typing speed, etc.
>>>>
>>>> Regards,
>>>> Johann.
>>>>
>>>> On Mon, Jan 15, 2018 at 4:50 PM, Pamoda Wimalasiri <[email protected]>
>>>> wrote:
>>>>
>>>>> Hi all,
>>>>>
>>>>> I'm currently working on a risk score calculation method for the
>>>>> authentication request of IAM. I'm still doing the background research on
>>>>> the behavior of other similar approaches [1] and the technologies that can
>>>>> be used.
>>>>>
>>>>> According to my research, the risk score can be calculated based on
>>>>> parameters such as
>>>>>
>>>>>    - IP address
>>>>>    - Geographical location
>>>>>    - Authentication history
>>>>>
>>>>> Are we considering only the past data here ?
>>
>> We should include the current active sessions too. For example if the
>> user is already in an authenticated session and if she/he is trying to
>> authenticate again, the 2nd attempt might be an attacker.
>>
>>
>>>>>    - Time of day
>>>>>
>>>>> In existing approaches, the total level of risk is calculated by the
>>>>> sum of weighted scores of each parameter.
>>>>>
>>>>> Any suggestions are highly appreciated.
>>>>>
>>>>> [1] https://backstage.forgerock.com/docs/am/5.5/authenticati
>>>>> on-guide/index.html#authn-adaptive
>>>>>
>>>>> Thanks,
>>>>> Pamoda
>>>>> --
>>>>>
>>>>> *Pamoda Wimalasiri*
>>>>> Software Engineer - WSO2
>>>>>
>>>>> Email : [email protected]
>>>>> Mobile : +94713705814 <+94%2077%20936%207571>
>>>>> Web : https://wso2.com/
>>>>>
>>>>>
>>>>
>>>>
>>>> --
>>>>
>>>> *Johann Dilantha Nallathamby*
>>>> Senior Lead Solutions Engineer
>>>> WSO2, Inc.
>>>> lean.enterprise.middleware
>>>>
>>>> Mobile: *+94 77 7776950*
>>>> LinkedIn: *http://www.linkedin.com/in/johann-nallathamby
>>>> <http://www.linkedin.com/in/johann-nallathamby>*
>>>> Medium: *https://medium.com/@johann_nallathamby
>>>> <https://medium.com/@johann_nallathamby>*
>>>> Twitter: *@dj_nallaa*
>>>>
>>>
>>>
>>>
>>> --
>>> Dimuthu Leelarathne
>>> Director, Solutions Architecture
>>>
>>> WSO2, Inc. (http://wso2.com)
>>> email: [email protected]
>>> Mobile: +94773661935 <+94%2077%20366%201935>
>>> Blog: http://muthulee.blogspot.com
>>>
>>> Lean . Enterprise . Middleware
>>>
>>> _______________________________________________
>>> Architecture mailing list
>>> [email protected]
>>> https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture
>>>
>>>
>>
>>
>> --
>> Prakhash Sivakumar
>> Software Engineer | WSO2 Inc
>> Platform Security Team
>> Mobile : +94771510080 <+94%2077%20151%200080>
>> Blog : https://medium.com/@PrakhashS
>>
>
>
>
> --
>
> *Pamoda Wimalasiri*
> Software Engineer - WSO2
>
> Email : [email protected]
> Mobile : +94713705814 <+94%2077%20936%207571>
> Web : https://wso2.com/
>
>


-- 

*Ruwan Abeykoon*
*Associate Director/Architect**,*
*WSO2, Inc. http://wso2.com <https://wso2.com/signature> *
*lean.enterprise.middleware.*
_______________________________________________
Architecture mailing list
[email protected]
https://mail.wso2.org/cgi-bin/mailman/listinfo/architecture

Reply via email to