Building the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines
Title | Building the Security Behavior Observatory: An Infrastructure for Long-term Monitoring of Client Machines |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Forget, Alain, Komanduri, Saranga, Acquisti, Alessandro, Christin, Nicolas, Cranor, Lorrie Faith, Telang, Rahul |
Conference Name | Proceedings of the 2014 Symposium and Bootcamp on the Science of Security |
Publisher | ACM |
Conference Location | Raleigh, NC, USA |
ISBN Number | 978-1-4503-2907-1 |
Keywords | ACM CCS, Architectures, CPS Technologies, cyber security, Database and Storage Security, Foundations, Hardware Security Implementation, Human and Societal Aspects of Security and Privacy, Management and Querying of Encrypted Data, science of security, Security in Hardware, USE: User Security Behvaior |
Abstract | We present an architecture for the Security Behavior Observatory (SBO), a client-server infrastructure designed to collect a wide array of data on user and computer behavior from hundreds of participants over several years. The SBO infrastructure had to be carefully designed to fulfill several requirements. First, the SBO must scale with the desired length, breadth, and depth of data collection. Second, we must take extraordinary care to ensure the security of the collected data, which will inevitably include intimate participant behavioral data. Third, the SBO must serve our research interests, which will inevitably change as collected data is analyzed and interpreted. This short paper summarizes some of our design and implementation benefits and discusses a few hurdles and trade-offs to consider when designing such a data collection system. |
URL | http://doi.acm.org/10.1145/2600176.2600200 |
DOI | 10.1145/2600176.2600200 |
Citation Key | Forget:2014:BSB:2600176.2600200 |
- Architectures
- Architectures
- ACM CCS
- Architectures
- CPS Technologies
- cyber security
- Database and Storage Security
- foundations
- Hardware Security Implementation
- Human and Societal Aspects of Security and Privacy
- Management and Querying of Encrypted Data
- Science of Security
- Security in Hardware
- USE: User Security Behvaior
- ACM CCS
- Cyber Security
- Database and Storage Security
- Management and Querying of Encrypted Data
- Hardware Security Implementation
- Human and Societal Aspects of Security and Privacy
- Security in Hardware