ATTRIBUTE-BASED ACCESS CONTROL POLICY GENERATION APPROACH FROM ACCESS LOGS BASED ON THE CATBOOST

被引:0
|
作者
Quan, Shan [1 ]
Zhao, Yongdan [1 ]
Helil, Nurmamat [1 ]
机构
[1] Xinjiang Univ, Coll Math & Syst Sci, Urumqi, Peoples R China
基金
中国国家自然科学基金;
关键词
ABAC policy; access logs; policy mining; ensemble learning; CatBoost;
D O I
10.31577/cai20233615
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attribute-based access control (ABAC) has higher flexibility and better scalability than traditional access control and can be used for fine-grained access control of large-scale information systems. Although ABAC can depict a dynamic, complex access control policy, it is costly, tedious, and error-prone to manually define. Therefore, it is worth studying how to construct an ABAC policy efficiently and accurately. This paper proposes an ABAC policy generation approach based on the CatBoost algorithm to automatically learn policies from historical access logs. First, we perform a weighted reconstruction of the attributes for the policy to be mined. Second, we provide an ABAC rule extraction algorithm, rule pruning algorithm, and rule optimization algorithm, among which the rule pruning and rule optimization algorithms are used to improve the accuracy of the generated policies. In addition, we present a new policy quality indicator to measure the accuracy and simplicity of the generated policies. Finally, the results of an experiment conducted to validate the approach verify its feasibility and effectiveness.
引用
收藏
页码:615 / 650
页数:36
相关论文
共 50 条
  • [41] In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control
    Heutelbeck, Dominic
    Baur, Marc Lucas
    Kluba, Martin
    [J]. PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 59 - 70
  • [42] An Efficient Verification Approach to Separation of Duty in Attribute-Based Access Control
    Yang, Benyuan
    Hu, Hesuan
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2024, 36 (09) : 4428 - 4442
  • [43] PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework
    LeMay, Michael
    Fatemieh, Omid
    Gunter, Carl A.
    [J]. SACMAT'07: PROCEEDINGS OF THE 12TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, 2007, : 205 - 214
  • [44] Policy Adaptation in Attribute-Based Access Control for Inter-organizational Collaboration
    Das, Saptarshi
    Sural, Sharnik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (CIC), 2017, : 136 - 145
  • [45] Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates
    Decat, Maarten
    Moeys, Jasper
    Lagaisse, Bert
    Joosen, Wouter
    [J]. ENGINEERING SECURE SOFTWARE AND SYSTEMS (ESSOS 2015), 2015, 8978 : 196 - 210
  • [46] A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability
    Lin, Guofeng
    You, Lirong
    Hui, Bing
    Hong, Hanshu
    Su, Zhixin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (04): : 1832 - 1853
  • [47] Qualitative Intention-aware Attribute-based Access Control Policy Refinement
    Mitani, Shohei
    Kwon, Jonghoon
    Ghate, Nakul
    Singh, Taniya
    Ueda, Hirofumi
    Perrig, Adrian
    [J]. PROCEEDINGS OF THE 28TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2023, 2023, : 201 - 208
  • [48] A New Attribute-Based Access Control Model for RDBMS
    Al-Saraireh, Jaafer
    Hassan, Majid
    [J]. CYBERNETICS AND INFORMATION TECHNOLOGIES, 2022, 22 (04) : 3 - 22
  • [49] Anonymity in Attribute-Based Access Control: Framework and Metric
    Zhang, Runnan
    Liu, Gang
    Kang, Hongzhaoning
    Wang, Quan
    Wan, Bo
    Luo, Nan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (01) : 463 - 475
  • [50] Enabling Attribute-Based Access Control in NoSQL Databases
    Gupta, Eeshan
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    [J]. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2023, 11 (01) : 208 - 223