An Insider Threat Mitigation Framework Using Attribute Based Access Control

05/31/2023
by   Olusesi Balogun, et al.
0

Insider Threat is a significant and potentially dangerous security issue in corporate settings. It is difficult to mitigate because, unlike external threats, insiders have knowledge of an organization's access policies, access hierarchy, access protocols, and access scheduling. Several approaches to reducing insider threat have been proposed in the literature. However, the integration of access control and moving target defense (MTD) for deceiving insiders has not been adequately discussed. In this paper, we combine MTD, deception, and attribute-based access control to make it more difficult and expensive for an insider to gain unauthorized access. We introduce the concept of correlated attributes into ABAC and extend the ABAC model with MTD by generating mutated policy using the correlated attributes for insider threat mitigation. The evaluation results show that the proposed framework can effectively identify correlated attributes and produce adequate mutated policy without affecting the usability of the access control systems.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/19/2021

Decentralized Policy Information Points for Multi-Domain Environments

Access control models have been developed to control authorized access t...
research
08/19/2020

Learning Attribute-Based and Relationship-Based Access Control Policies with Unknown Values

Attribute-Based Access Control (ABAC) and Relationship-based access cont...
research
12/28/2018

A Precedent Approach to Assigning Access Rights

To design a discretionary access control policy, a technique is proposed...
research
11/13/2021

PAMMELA: Policy Administration Methodology using Machine Learning

In recent years, Attribute-Based Access Control (ABAC) has become quite ...
research
05/18/2021

Adaptive ABAC Policy Learning: A Reinforcement Learning Approach

With rapid advances in computing systems, there is an increasing demand ...
research
07/04/2022

Combining ID's, Attributes, and Policies in Hyperledger Fabric

This work aims to provide a more secure access control in Hyperledger Fa...

Please sign up or login with your details

Forgot password? Click here to reset