Dynamic counter-measures for risk-based access control systems: An evolutive approach

被引:26
作者
Diaz-Lopez, Daniel [1 ]
Dolera-Tormo, Gines [1 ]
Gomez-Marmol, Felix [2 ]
Martinez-Perez, Gregorio [1 ]
机构
[1] Univ Murcia, Dept Ingn Informat & Comunicac, E-30100 Murcia, Spain
[2] NEC Labs Europe, Kurfursten Anlage 36, D-69115 Heidelberg, Germany
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2016年 / 55卷
关键词
ISO; 27001; ISMS; Risk management; Access control systems; Genetic algorithms; Counter-measures; MULTILEVEL SECURITY; QUANTIFIED RISK; AUTHENTICATION; OPTIMIZATION;
D O I
10.1016/j.future.2014.10.012
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Risk-based access control systems are a new element in access control categories, incorporating risk analysis as part of the inputs to consider when taking an authorization decision. A risk analysis over a resource leads generally to temporal allocation of the resource in a risk level (e.g. high, medium, low). Ideally, for each risk level and kind of resource, the access control system should take an authorization decision (expressed like a permit or deny) and the system administrator should also trigger specific counter-measures to protect resources according to their risk level. In a small access control system with few resources it is possible for an administrator to follow the risk level changes and react promptly with counter-measures; but in medium/large access control systems it is almost unfeasible to react in a customized way to thousands of risk level emergencies asking for attention. In this paper we propose the adoption of dynamic counter-measures (which can be integrated within access control policies) changing along time to face variations in the risk level of every resource, bringing two main benefits, namely: (i) a suitable resource protection according to the risk level (not under or over estimated) and (ii) an access control system granting/denying access depending on the fulfillment of a set of security controls applicable in an authorization access request. To define the most appropriate set of counter-measures applicable for a specific situation we define a method based on genetic algorithms, which allows to find a solution in a reasonable time frame satisfying different required conditions. Finally, the conducted experiments show the applicability of our proposal in a real scenario. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:321 / 335
页数:15
相关论文
共 49 条
[1]  
Agrawal M., 2012, International Journal on Computer Science and Engineering, V4, P877
[2]  
Alba E, 2008, OPER RES COMPUT SCI, V42, P1, DOI 10.1007/978-0-387-77610-1
[3]  
[Anonymous], CODASPY
[4]  
[Anonymous], 2011, P 5 INT C INF TECHN, DOI DOI 10.1109/ICIMU.2011.6122717
[5]  
[Anonymous], 2013, 27001 ISOIEC
[6]   A novel intrusion severity analysis approach for Clouds [J].
Arshad, Junaid ;
Townend, Paul ;
Xu, Jie .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING AND ESCIENCE, 2013, 29 (01) :416-428
[7]  
Bailey C., 2011, Proceedings of the 2011 IEEE 9th International Conference on Dependable, Autonomic and Secure Computing (DASC 2011), P37, DOI 10.1109/DASC.2011.31
[8]  
Bailey C., 2014, SEAMS 14
[9]  
Calder A., 2012, IT GOVERNANCE INT GU, VFifth
[10]  
Cha J., 2012, Int. Conf. on IT Conv. and Sec, P41, DOI DOI 10.1007/978-94-007-2911-7_4