A new technology from Georgia Tech is addressing one of the most significant threats to the security of cyberinfrastructure—that is, insider attacks by users with valid username/p.

About

Abdul Raheem Beyah and Cherita Corbett from the School of Electrical and Computer Engineering at Georgia Tech have developed an innovative intrusion detection system (IDS) with an entirely new approach to detecting evolving threats. Using hardware signatures that are innate in network traffic, the Georgia Tech system detects unauthorized devices that are inserted into the network. This successful solution relies on the signature generated by the “behavior” of data packets—even those that are encrypted—and leaked into normal network traffic by the hardware. This unique hardware signature (akin to a fingerprint) makes it possible to determine whether a node is authorized to access the network, regardless of whether it achieved that access using legitimate login credentials. Georgia Tech’s network-based approach has significant advantages over the current industry approach of using network access control (NAC) solutions. A NAC solution requires a client on each node that it manages to identify the node and to control access to the network. However, many devices are not NAC enabled because of an unsupported operating system (e.g., Mac OS, UNIX, Linux), and thus a large number of seemingly benign devices such as phones, printers, thermostats, and cameras are unmanageable and cannot be secured. Georgia Tech’s innovation does not require a client and therefore will work for unmanageable devices (which will far outnumber manageable devices in the future).

Key Benefits

Long-Term Solution: Because no software client is required, this technique can be used to identify both current and future unmanageable devices. Failsafe: Because it relies on inherently unique signatures tied to hardware’s diverse compositions, component manufacturers, and physical differences, the system is difficult to defeat by unauthorized—or even authorized—users. Reduced Vulnerability: As a network-based solution, this method eliminates the security vulnerabilities associated with software additions at each node. Less Complex: This approach functions with just a single system per network segment rather than multiple node-based systems. Simple and Low-Cost Implementation: The system is inexpensive to deploy and leverages existing infrastructure investments.

Applications

All major companies and governments in the United States and abroad use NAC systems for access control and device management. This new system can be used to extend those systems to supplement current techniques for identifying manageable devices (i.e., devices running software clients) and as a new method that identifies unmanageable devices.

Register for free for full unlimited access to all innovation profiles on LEO

  • Discover articles from some of the world’s brightest minds, or share your thoughts and add one yourself
  • Connect with like-minded individuals and forge valuable relationships and collaboration partners
  • Innovate together, promote your expertise, or showcase your innovations