Anomaly detection and visualization in generative RBAC models

Maria Leitner, Stefanie Rinderle-Ma

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

With the wide use of Role-based Access Control (RBAC), the need for monitoring, evaluation, and verification of RBAC implementations (e.g., to evaluate ex post which users acting in which roles were authorized to execute permissions) is evident. In this paper, we aim at detecting and identifying anomalies that originate from insiders such as the infringement of rights or irregular activities. To do that, we compare prescriptive (original) RBAC models (i.e. how the RBAC model is expected to work) with generative (currentstate) RBAC models (i.e. the actual accesses represented by an RBAC model obtained with mining techniques). For this we present different similarity measures for RBAC models and their entities. We also provide techniques for visualizing anomalies within RBAC models based on difference graphs. This can be used for the alignment of RBAC models such as for policy updates or reconciliation. The effectiveness of the approach is evaluated based on a prototypical implementation and an experiment.

Original languageEnglish
Title of host publicationSACMAT 2014 - Proceedings of the 19th ACM Symposium on Access Control Models and Technologies
PublisherAssociation for Computing Machinery
Pages41-52
Number of pages12
ISBN (Print)9781450329392
DOIs
StatePublished - 2014
Externally publishedYes
Event19th ACM Symposium on Access Control Models and Technologies, SACMAT 2014 - London, ON, Canada
Duration: 25 Jun 201427 Jun 2014

Publication series

NameProceedings of ACM Symposium on Access Control Models and Technologies, SACMAT

Conference

Conference19th ACM Symposium on Access Control Models and Technologies, SACMAT 2014
Country/TerritoryCanada
CityLondon, ON
Period25/06/1427/06/14

Keywords

  • Access Control
  • Anomaly detection
  • Audit
  • Graph edit distance
  • Inexact graph matching
  • RBAC
  • Similarity

Fingerprint

Dive into the research topics of 'Anomaly detection and visualization in generative RBAC models'. Together they form a unique fingerprint.

Cite this