ATTRIBUTE-BASED ACCESS CONTROL POLICY GENERATION APPROACH FROM ACCESS LOGS BASED ON THE CATBOOST

被引:0
|
作者
Quan, Shan [1 ]
Zhao, Yongdan [1 ]
Helil, Nurmamat [1 ]
机构
[1] Xinjiang Univ, Coll Math & Syst Sci, Urumqi, Peoples R China
基金
中国国家自然科学基金;
关键词
ABAC policy; access logs; policy mining; ensemble learning; CatBoost;
D O I
10.31577/cai20233615
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Attribute-based access control (ABAC) has higher flexibility and better scalability than traditional access control and can be used for fine-grained access control of large-scale information systems. Although ABAC can depict a dynamic, complex access control policy, it is costly, tedious, and error-prone to manually define. Therefore, it is worth studying how to construct an ABAC policy efficiently and accurately. This paper proposes an ABAC policy generation approach based on the CatBoost algorithm to automatically learn policies from historical access logs. First, we perform a weighted reconstruction of the attributes for the policy to be mined. Second, we provide an ABAC rule extraction algorithm, rule pruning algorithm, and rule optimization algorithm, among which the rule pruning and rule optimization algorithms are used to improve the accuracy of the generated policies. In addition, we present a new policy quality indicator to measure the accuracy and simplicity of the generated policies. Finally, the results of an experiment conducted to validate the approach verify its feasibility and effectiveness.
引用
收藏
页码:615 / 650
页数:36
相关论文
共 50 条
  • [11] Attribute-Based Hierarchical Access Control With Extendable Policy
    Xiao, Meiyan
    Li, Hongbo
    Huang, Qiong
    Yu, Shui
    Susilo, Willy
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2022, 17 : 1868 - 1883
  • [12] An approach to attribute-based object access
    Liu, Qun
    Feng, Dan
    Wang, Fang
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2006, 34 (12): : 50 - 52
  • [13] Attribute-Based Access Control Policy Review in Permissioned Blockchain
    Lawal, Sherifdeen
    Krishnan, Ram
    SECURE KNOWLEDGE MANAGEMENT IN THE ARTIFICIAL INTELLIGENCE ERA, 2022, 1549 : 97 - 109
  • [14] Attribute-Based Access Control for the Swarm With Distributed Policy Management
    Fedrecheski, Geovane
    Costa De Biase, Laisa Caroline
    Calcina-Ccori, Pablo C.
    Zuffo, Marcelo Knorich
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2019, 65 (01) : 90 - 98
  • [15] Policy Adaptation in Hierarchical Attribute-based Access Control Systems
    Das, Saptarshi
    Sural, Shamik
    Vaidya, Jaideep
    Atluri, Vijayalakshmi
    ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2019, 19 (03)
  • [16] Using attribute-based access control to enable attribute-based messaging
    Bobba, Rakesh
    Fatemieh, Omid
    Khan, Fariba
    Gunter, Carl A.
    Khurana, Himanshu
    22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 403 - +
  • [17] Attribute-Based Oblivious Access Control
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    Yan, Jun
    COMPUTER JOURNAL, 2012, 55 (10): : 1202 - 1215
  • [18] Attribute-based signcryption with hybrid access policy
    Gang Yu
    Zhenfu Cao
    Peer-to-Peer Networking and Applications, 2017, 10 : 253 - 261
  • [19] Attribute-based signcryption with hybrid access policy
    Yu, Gang
    Cao, Zhenfu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2017, 10 (01) : 253 - 261
  • [20] An Attribute-Based Access Control Policy Retrieval Method Based on Binary Sequence
    Pan, Ruijie
    Wang, Gaocai
    Wu, Man
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021