Multiplatform Usab Multiplatform Usab The overall purpose of MUSES i The overall purpose of MUSES i by reducing the risks introduced by reducing the risks introduced Most corporate security incidents are caused by organization Most corporate security incidents are caused by organization maliciousbehaviour. MUSES will provide a device independent, user-centric and se MUSES will provide a device independent, user-centric and se concept of seamless working experience on different devices, in follow up the process on different ones, without corporate digit follow up the process on different ones, without corporate digit MUSES aims at the benefit of the co Evolutionary Computation will be used in Evolutionary Computation will be used in User modelling with models optimised to match observations using EC. observations using EC. MUSES will try to create a model of users and their context so that behaviours that can lead to their context so that behaviours that can lead to security problems can be previewed and, if possible, avoided. These user models will depend possible, avoided. These user models will depend on observations of the context, but also will employ heuristics to match them to known non- employ heuristics to match them to known non- safe behaviours. EC will be used as a metaheuristic to obtain optimal models matching reality . matching reality . MUSES partners S2 Grupo (ES), Universidad de Granada (ES), HITEC (DE), U MUSES partners S2 Grupo (ES), Universidad de Granada (ES), HITEC (DE), U Engineering – CURE (AT), Wind Telecomunicazioni (IT), TXT e-s Project No. 318508 FP7-ICT-2011-8 MUSES Budget: 4.76M€ EU Funding: 3.59M€ Contact: Anna I. Esparcia – [email protected] ble Endpoint Security Contact: Anna I. Esparcia – [email protected] JJ Merelo – [email protected] ble Endpoint Security is to foster corporate security is to foster corporate security d by user behaviour d by user behaviour insiders, either by their lack of knowledge or inadequate or insiders, either by their lack of knowledge or inadequate or elf-adaptive corporate security system, able to cope with the elf-adaptive corporate security system, able to cope with the n which a user may start a session on a device and location and tal asset loss. tal asset loss. ompany, but focusing on the user n MUSES in two different contexts: n MUSES in two different contexts: Complex Event Processing using EC so that the underlying mechanisms can be found out. underlying mechanisms can be found out. In some cases, and independently of specific user behaviour, sequences of actions might lead to behaviour, sequences of actions might lead to possible security failures. Complex Event Processing captures these sequences in real time Processing captures these sequences in real time and tries to model them so that the next action can be foreseen. To create these models, EC will can be foreseen. To create these models, EC will be applied also in conjunction with other heuristics. Université de Genève (CH), Center for Usability Research & Université de Genève (CH), Center for Usability Research & solutions (IT), KU Leuven (BE) and Sweden Connectivity (SE).