Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3140549.3140553acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article
Public Access

Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control

Published: 30 October 2017 Publication History

Abstract

Recently, both academia and industry have recognized the need for leveraging real-time information for the purposes of specifying, enforcing and maintaining rich and flexible authorization policies. In such a context, security-related properties, a.k.a., attributes, have been recognized as a convenient abstraction for providing a well-defined representation of such information, allowing for them to be created and exchanged by different independently-run organizational domains for authorization purposes. However, attackers may attempt to compromise the way attributes are generated and communicated by recurring to hacking techniques, e.g., forgery, in an effort to bypass authorization policies and their corresponding enforcement mechanisms and gain unintended access to sensitive resources as a result.
In this paper, we propose a novel technique that allows for enterprises to pro-actively collect attributes from the different entities involved in the access request process, e.g., users, subjects, protected resources, and running environments. After the collection, we aim to carefully select the attributes that uniquely identify the aforementioned entities, and randomly mutate the original access policies over time by adding additional policy rules constructed from the newly-identified attributes. This way, even when attackers are able to compromise the original attributes, our mutated policies may offer an additional layer of protection to deter ongoing and future attacks. We present the rationale and experimental results supporting our proposal, which provide evidence of its suitability for being deployed in practice.

References

[1]
Christopher Bailey, David W. Chadwick, and Rogério De Lemos. 2011. Selfadaptive authorization framework for policy based RBAC/ABAC models. In 2011 IEEE Dependable, Autonomic and Secure Computing (DASC). IEEE, 37--44.
[2]
Lujo Bauer, Scott Garriss, and Michael K Reiter. 2011. Detecting and resolving policy misconfigurations in access-control systems. ACM Transactions on Information and System Security (TISSEC) 14, 1 (2011), 2.
[3]
Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, and Ian H. Witten. 2009. The WEKA Data Mining Software: An Update. SIGKDD Explor. Newsl. 11, 1 (Nov. 2009), 10--18.
[4]
Hongxin Hu, Gail-Joon Ahn, and Ketan Kulkarni. 2012. Detecting and resolving firewall policy anomalies. IEEE Dependable and Secure Computing 9, 3 (2012), 318--331.
[5]
Vincent C. Hu, David Ferraiolo, Rick Kuhn, Adam Schnitzer, Kenneth Sandlin, Robert Miller, and Karen Scarfone. 2014. Guide to attribute based access control (ABAC) definition and considerations. NIST Special Publication 800 (2014), 162.
[6]
Ewa Huebner, Derek Bem, and Cheong Kai Wee. 2006. Data hiding in the NTFS file system. digital investigation 3, 4 (2006), 211--226.
[7]
Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, and X. Sean Wang. 2011. Moving target defense: creating asymmetric uncertainty for cyber threats. Vol. 54. Springer Science & Business Media.
[8]
Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, and Xinwen Zhang. 2011. Patient-centric authorization framework for electronic healthcare services. Computers & Security 30, 2 (2011), 116--127.
[9]
Wenke Lee, Salvatore J. Stolfo, and Kui W. Mok. 1999. A data mining framework for building intrusion detection models. In Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on. IEEE, 120--132.
[10]
M. Lichman. 2013. UCI Machine Learning Repository. (2013). http://archive.ics.uci.edu/ml.
[11]
Bing Liu, Wynne Hsu, and Yiming Ma. 1998. Integrating Classification and Association Rule Mining. In Fourth International Conference on Knowledge Discovery and Data Mining. AAAI Press, 80--86.
[12]
Ken Montanez. 2016. Amazon Access Samples Data Set. (2016). http://archive.ics.uci.edu/ml/datasets/Amazon+Access+Samples.
[13]
Simon Parkinson, Vassiliki Somaraki, and Rupert Ward. 2016. Auditing file system permissions using association rule mining. Expert Systems with Applications 55 (2016), 274--283.
[14]
Ramakrishnan Srikant and Rakesh Agrawal. 1996. Mining quantitative association rules in large relational tables. In ACM SIGMOD Record, Vol. 25. ACM, 1--12.
[15]
James J. Treinen and Ramakrishna Thurimella. 2006. A framework for the application of association rule mining in large intrusion detection infrastructures. In Recent Advances in Intrusion Detection. Springer, 1--18.
[16]
Krishna K. Venkatasubramanian, Tridib Mukherjee, and Sandeep K. S. Gupta. 2014. CAAC - An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures. ACM Transactions on Autonomous and Adaptive Systems (TAAS) 8, 4 (2014), 20.
[17]
Zhongyuan Xu and Scott D. Stoller. 2015. Mining attribute-based access control policies. IEEE Dependable and Secure Computing 12, 5 (2015), 533--545.

Cited By

View all
  • (2022)Contemporaneous Update and Enforcement of ABAC PoliciesProceedings of the 27th ACM on Symposium on Access Control Models and Technologies10.1145/3532105.3535021(31-42)Online publication date: 7-Jun-2022
  • (2020)Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC PoliciesProceedings of the 25th ACM Symposium on Access Control Models and Technologies10.1145/3381991.3395615(131-144)Online publication date: 10-Jun-2020
  • (2019)Mining least privilege attribute based access control policiesProceedings of the 35th Annual Computer Security Applications Conference10.1145/3359789.3359805(404-416)Online publication date: 9-Dec-2019
  • Show More Cited By

Index Terms

  1. Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      MTD '17: Proceedings of the 2017 Workshop on Moving Target Defense
      October 2017
      126 pages
      ISBN:9781450351768
      DOI:10.1145/3140549
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 30 October 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. access control
      2. attributes
      3. authorization
      4. moving target defense
      5. mutated policies

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CCS '17
      Sponsor:

      Acceptance Rates

      MTD '17 Paper Acceptance Rate 9 of 26 submissions, 35%;
      Overall Acceptance Rate 40 of 92 submissions, 43%

      Upcoming Conference

      ICSE 2025

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)72
      • Downloads (Last 6 weeks)8
      Reflects downloads up to 21 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Contemporaneous Update and Enforcement of ABAC PoliciesProceedings of the 27th ACM on Symposium on Access Control Models and Technologies10.1145/3532105.3535021(31-42)Online publication date: 7-Jun-2022
      • (2020)Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC PoliciesProceedings of the 25th ACM Symposium on Access Control Models and Technologies10.1145/3381991.3395615(131-144)Online publication date: 10-Jun-2020
      • (2019)Mining least privilege attribute based access control policiesProceedings of the 35th Annual Computer Security Applications Conference10.1145/3359789.3359805(404-416)Online publication date: 9-Dec-2019
      • (2018)Catch Me If You CanProceedings of the 5th ACM Workshop on Moving Target Defense10.1145/3268966.3268970(31-39)Online publication date: 15-Oct-2018
      • (2018) RiskPol Proceedings of the Third ACM Workshop on Attribute-Based Access Control10.1145/3180457.3180462(54-60)Online publication date: 14-Mar-2018

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media