Discovery of Multi-Level Security Policies
نویسندگان
چکیده
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce security policies that govern against the misuse of data. Often security policies are not known, too imprecise or simply have been disabled because of changing requirements. Recently several proposals have been made to use data mining techniques to discover pro les and anomalous user behavior from audit logs. These approaches, however, are often too ne-grained in that they compute too many rules to be useful for an administrator in implementing appropriate security enforcing mechanisms. In this paper we present a novel approach to discover security policies from audit logs. The approach is based on the usage of multiple concept hierarchies that specify properties of objects and data at di erent levels of abstraction and thus can embed useful domain knowledge. A pro ler, attached to the information system's auditing component, utilizes such concept hierarchies to compute pro les at di erent levels of granularity, guided by the administrator through the speci cation of an interestingness measure. The computed pro les can be translated into security policies and existing policies can be veri ed against the pro les. The proposed approach provides a exible framework for (re-)engineering security policies for diverse types of information systems.
منابع مشابه
A Conceptual Model of Virtual Bank I.S. Security Meta-Policy from a Network Perspective
Despite a continued scholarly conversation on Information Systems Security (ISsec) policies and governance, a perspective that examines these issues at the organisational level has been generally neglected. This is of concern as managing ISsec is multi-level in nature for many organisations ranging from the individual level, such as BYOD (Bring Your Own Device) policies, to the strategic level,...
متن کاملMHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security
Mobile ad-hoc networks have attracted a great deal of attentions over the past few years. Considering their applications, the security issue has a great significance in them. Security scheme utilization that includes prevention and detection has the worth of consideration. In this paper, a method is presented that includes a multi-level security scheme to identify intrusion by sensors and authe...
متن کاملGender Analysis of Social Security Policies in Post- Revolutionary Iran
Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...
متن کاملGender Analysis of Social Security Policies in Post- Revolutionary Iran
Introduction: Due to the fact that gender is important as the most basic pillar of individuals ’identities in all social relations, it is helpful to identify current deficiencies in policymaking. Method: The method used is qualitative content analysis in the gender analysis approach. To this end, the documents and approvals of the main womenchr(chr(chr('39')39chr('39'))39chr(chr('39')39chr('3...
متن کاملToward Specifying and Validating Cross-Domain Policies∗
Formal security policies are extremely useful for two related reasons. First, they allow a policy to be considered in isolation, separate from programs under the purview of the policy and separate from the implementation of the policy’s enforcement. Second, policies can be checked for compliance against higher-level security goals by using automated analyses. By contrast, ad hoc enforcement mec...
متن کامل