An Automatic Attribute Based Access Control Policy Extraction from Access Logs

03/16/2020
by   Leila Karimi, et al.
0

With the rapid advances in computing and information technologies, traditional access control models have become inadequate in terms of capturing fine-grained, and expressive security requirements of newly emerging applications. An attribute-based access control (ABAC) model provides a more flexible approach for addressing the authorization needs of complex and dynamic systems. While organizations are interested in employing newer authorization models, migrating to such models pose as a significant challenge. Many large-scale businesses need to grant authorization to their user populations that are potentially distributed across disparate and heterogeneous computing environments. Each of these computing environments may have its own access control model. The manual development of a single policy framework for an entire organization is tedious, costly, and error-prone. In this paper, we present a methodology for automatically learning ABAC policy rules from access logs of a system to simplify the policy development process. The proposed approach employs an unsupervised learning-based algorithm for detecting patterns in access logs and extracting ABAC authorization rules from these patterns. In addition, we present two policy improvement algorithms, including rule pruning and policy refinement algorithms to generate a higher quality mined policy. Finally, we implement a prototype of the proposed approach to demonstrate its feasibility.

READ FULL TEXT
research
11/13/2021

PAMMELA: Policy Administration Methodology using Machine Learning

In recent years, Attribute-Based Access Control (ABAC) has become quite ...
research
05/18/2021

Adaptive ABAC Policy Learning: A Reinforcement Learning Approach

With rapid advances in computing systems, there is an increasing demand ...
research
03/25/2020

Unsupervised Learning for security of Enterprise networks by micro-segmentation

Micro-segmentation is a network security technique that requires deliver...
research
03/28/2022

Toward Deep Learning Based Access Control

A common trait of current access control approaches is the challenging n...
research
08/16/2019

The Next 700 Policy Miners: A Universal Method for Building Policy Miners

A myriad of access control policy languages have been and continue to be...
research
07/07/2018

Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations

`Anytime, Anywhere' data access model has become a widespread IT policy ...
research
12/16/2019

Misconfiguration Management of Network Security Components

Many companies and organizations use firewalls to control the access to ...

Please sign up or login with your details

Forgot password? Click here to reset