ATTRIBUTE-BASED ACCESS CONTROL POLICY GENERATION APPROACH FROM ACCESS LOGS BASED ON THE CATBOOST

被引:0
|
作者
Quan, Shan [1 ]
Zhao, Yongdan [1 ]
Helil, Nurmamat [1 ]
机构
[1] Xinjiang Univ, Coll Math & Syst Sci, Urumqi, Peoples R China
基金
中国国家自然科学基金;
关键词
ABAC policy; access logs; policy mining; ensemble learning; CatBoost;
D O I
10.31577/cai20233615
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attribute-based access control (ABAC) has higher flexibility and better scalability than traditional access control and can be used for fine-grained access control of large-scale information systems. Although ABAC can depict a dynamic, complex access control policy, it is costly, tedious, and error-prone to manually define. Therefore, it is worth studying how to construct an ABAC policy efficiently and accurately. This paper proposes an ABAC policy generation approach based on the CatBoost algorithm to automatically learn policies from historical access logs. First, we perform a weighted reconstruction of the attributes for the policy to be mined. Second, we provide an ABAC rule extraction algorithm, rule pruning algorithm, and rule optimization algorithm, among which the rule pruning and rule optimization algorithms are used to improve the accuracy of the generated policies. In addition, we present a new policy quality indicator to measure the accuracy and simplicity of the generated policies. Finally, the results of an experiment conducted to validate the approach verify its feasibility and effectiveness.
引用
收藏
页码:615 / 650
页数:36
相关论文
共 50 条
  • [1] An Automatic Attribute-Based Access Control Policy Extraction From Access Logs
    Karimi, Leila
    Aldairi, Maryam
    Joshi, James
    Abdelhakim, Mai
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2304 - 2317
  • [2] Policy Extraction and Optimization with Access Logs for Attribute-based Access Control
    Sun, Wei
    Li, Long
    Hu, Ying
    [J]. Journal of Network Intelligence, 2023, 8 (03): : 932 - 947
  • [3] Mining Attribute-Based Access Control Policies from Logs
    Xu, Zhongyuan
    Stoller, Scott D.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXVIII, 2014, 8566 : 276 - 291
  • [4] Attribute Expressions, Policy Tables and Attribute-Based Access Control
    Crampton, Jason
    Williams, Conrad
    [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 79 - 90
  • [5] Attribute-Based Access Control
    Hu, Vincent C.
    Kuhn, D. Richard
    Ferraiolo, David F.
    [J]. COMPUTER, 2015, 48 (02) : 85 - 88
  • [6] On the Feasibility of Attribute-Based Access Control Policy Mining
    Chakraborty, Shuvra
    Sandhu, Ravi
    Krishnan, Ram
    [J]. 2019 IEEE 20TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION FOR DATA SCIENCE (IRI 2019), 2019, : 245 - 252
  • [7] Access Control Policy Generation Method Based on Access Control Logs
    Liu Aodi
    Du Xuehui
    Wang Na
    Shan Dibin
    Zhang Liu
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (01) : 324 - 331
  • [8] Attribute-based lightweight reconfigurable access control policy
    Xie, Rongna
    Li, Hui
    Shi, Guozhen
    Guo, Yunchuan
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (02): : 112 - 122
  • [9] Attribute-Based Hierarchical Access Control With Extendable Policy
    Xiao, Meiyan
    Li, Hongbo
    Huang, Qiong
    Yu, Shui
    Susilo, Willy
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1868 - 1883
  • [10] Attribute-Based Access Control Policy Review in Permissioned Blockchain
    Lawal, Sherifdeen
    Krishnan, Ram
    [J]. SECURE KNOWLEDGE MANAGEMENT IN THE ARTIFICIAL INTELLIGENCE ERA, 2022, 1549 : 97 - 109