Autonomous NAC with Behavior-Based AI for Government and Financial Institutions
Abstract
This paper explores the development of an autonomous Network Access Control (NAC) system powered by behavior-based artificial intelligence tailored for government and financial institutions. These sectors demand the highest levels of security due to the sensitivity of their data and critical infrastructure. The proposed system leverages AI to continuously monitor user and device behavior, dynamically enforcing access policies to detect and mitigate insider threats, unauthorized access, and anomalous activities in real time. By integrating behavior analytics with machine learning, the NAC framework adapts to evolving security threats without manual intervention, enhancing both security posture and operational efficiency. Experimental results demonstrate significant improvements in threat detection accuracy and reduction in false positives compared to traditional NAC solutions, highlighting the potential of autonomous AI-driven NAC systems in safeguarding critical government and financial networks.
References
Anderson, R. J. (2020). Security engineering: A guide to building dependable distributed systems. Wiley.
Bishop, M. (2018). Computer security: Art and science. Addison-Wesley.
Chen, T., & Zhao, Y. (2019). Machine learning techniques for intrusion detection in networks. Journal of Network and Computer Applications, 134, 1-15.
Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544-546.
Dwork, C., & Roth, A. (2014). The algorithmic foundations of differential privacy. Foundations and Trends in Theoretical Computer Science, 9(3-4), 211-407.
Goodfellow, I., Bengio, Y., & Courville, A. (2016). Deep learning. MIT Press.
Gupta, B., & Pandey, S. (2021). Reinforcement learning applications in cybersecurity: A review. International Journal of Computer Science and Information Security, 19(2), 123-131.
Hinton, G. E., Osindero, S., & Teh, Y. W. (2006). A fast learning algorithm for deep belief nets. Neural Computation, 18(7), 1527-1554.
Jain, A., & Singh, R. (2020). Behavior-based anomaly detection in network access control. IEEE Transactions on Information Forensics and Security, 15, 1245-1258.
Kim, J., & Kang, M. (2019). Autonomous network access control using machine learning techniques. Journal of Network and Systems Management, 27(3), 552-569.
Koller, D., & Friedman, N. (2009). Probabilistic graphical models: Principles and techniques. MIT Press.
LeCun, Y., Bengio, Y., & Hinton, G. (2015). Deep learning. Nature, 521(7553), 436-444.
Li, X., & Wang, Y. (2018). A survey on network intrusion detection systems based on machine learning. IEEE Access, 6, 35372-35385.
Mnih, V., Kavukcuoglu, K., Silver, D., Rusu, A. A., Veness, J., Bellemare, M. G., ... & Hassabis, D. (2015). Human-level control through deep reinforcement learning. Nature, 518(7540), 529-533.
O'Reilly, T. (2017). Securing the Internet of Things. Communications of the ACM, 60(4), 14-16.
Papernot, N., McDaniel, P., Goodfellow, I., Jha, S., Celik, Z. B., & Swami, A. (2016). Practical black-box attacks against machine learning. Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 506-519.
Russell, S., & Norvig, P. (2016). Artificial intelligence: A modern approach. Pearson.
Shaukat, K., & Anwar, F. (2019). Adaptive network security using reinforcement learning techniques. International Journal of Computer Science and Network Security, 19(1), 98-105.
Sommer, R., & Paxson, V. (2010). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy, 305-316.
Sutton, R. S., & Barto, A. G. (2018). Reinforcement learning: An introduction (2nd ed.). MIT Press.