ATTRIBUTE-BASED ACCESS CONTROL POLICY GENERATION APPROACH FROM ACCESS LOGS BASED ON THE CATBOOST

被引:0
|
作者
Quan, Shan [1 ]
Zhao, Yongdan [1 ]
Helil, Nurmamat [1 ]
机构
[1] Xinjiang Univ, Coll Math & Syst Sci, Urumqi, Peoples R China
基金
中国国家自然科学基金;
关键词
ABAC policy; access logs; policy mining; ensemble learning; CatBoost;
D O I
10.31577/cai20233615
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attribute-based access control (ABAC) has higher flexibility and better scalability than traditional access control and can be used for fine-grained access control of large-scale information systems. Although ABAC can depict a dynamic, complex access control policy, it is costly, tedious, and error-prone to manually define. Therefore, it is worth studying how to construct an ABAC policy efficiently and accurately. This paper proposes an ABAC policy generation approach based on the CatBoost algorithm to automatically learn policies from historical access logs. First, we perform a weighted reconstruction of the attributes for the policy to be mined. Second, we provide an ABAC rule extraction algorithm, rule pruning algorithm, and rule optimization algorithm, among which the rule pruning and rule optimization algorithms are used to improve the accuracy of the generated policies. In addition, we present a new policy quality indicator to measure the accuracy and simplicity of the generated policies. Finally, the results of an experiment conducted to validate the approach verify its feasibility and effectiveness.
引用
收藏
页码:615 / 650
页数:36
相关论文
共 50 条
  • [11] Attribute-based lightweight reconfigurable access control policy
    Xie, Rongna
    Li, Hui
    Shi, Guozhen
    Guo, Yunchuan
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (02): : 112 - 122
  • [12] An approach to attribute-based object access
    Liu, Qun
    Feng, Dan
    Wang, Fang
    [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2006, 34 (12): : 50 - 52
  • [13] Attribute-Based Access Control Policy Review in Permissioned Blockchain
    Lawal, Sherifdeen
    Krishnan, Ram
    [J]. SECURE KNOWLEDGE MANAGEMENT IN THE ARTIFICIAL INTELLIGENCE ERA, 2022, 1549 : 97 - 109
  • [14] Policy Adaptation in Hierarchical Attribute-based Access Control Systems
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (03)
  • [15] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [16] Attribute-Based Access Control for the Swarm With Distributed Policy Management
    Fedrecheski, Geovane
    Costa De Biase, Laisa Caroline
    Calcina-Ccori, Pablo C.
    Zuffo, Marcelo Knorich
    [J]. IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2019, 65 (01) : 90 - 98
  • [17] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    [J]. COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [18] Attribute-based signcryption with hybrid access policy
    Yu, Gang
    Cao, Zhenfu
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 253 - 261
  • [19] Attribute-based signcryption with hybrid access policy
    Gang Yu
    Zhenfu Cao
    [J]. Peer-to-Peer Networking and Applications, 2017, 10 : 253 - 261
  • [20] An Attribute-Based Access Control Policy Retrieval Method Based on Binary Sequence
    Pan, Ruijie
    Wang, Gaocai
    Wu, Man
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021