2019 IEEE International Conference on Big Data (Big Data) 2019
DOI: 10.1109/bigdata47090.2019.9005959
|View full text |Cite
|
Sign up to set email alerts
|

On the Quality of Classification Models for Inferring ABAC Policies from Access Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 17 publications
(30 citation statements)
references
References 13 publications
0
25
2
Order By: Relevance
“…โ€ข We develop a candidate DLBAC model, DLBAC ฮฑ , which outperforms classical policy mining and machine learning techniques in many aspects, including capturing the existing access control state of the system accurately and generalizing well to situations that were not seen during training time. โ€ข As DLBAC is a neural network, we address previously highlighted concerns on the explainability of the black-box nature of neural network-based systems for access control [12]. We apply deep learning interpretation methods to confirm that decision-making in DLBAC can indeed be understood to a large degree (albeit not with 100% accuracy).…”
Section: Introductionmentioning
confidence: 94%
See 3 more Smart Citations
“…โ€ข We develop a candidate DLBAC model, DLBAC ฮฑ , which outperforms classical policy mining and machine learning techniques in many aspects, including capturing the existing access control state of the system accurately and generalizing well to situations that were not seen during training time. โ€ข As DLBAC is a neural network, we address previously highlighted concerns on the explainability of the black-box nature of neural network-based systems for access control [12]. We apply deep learning interpretation methods to confirm that decision-making in DLBAC can indeed be understood to a large degree (albeit not with 100% accuracy).…”
Section: Introductionmentioning
confidence: 94%
“…Sanders et al [59] presented an approach to mine ABAC policies while satisfying the least privilege principle in a large-scale organization. Symbolic and non-symbolic ML algorithms to infer ABAC policies from access logs have been proposed by Cappelletti et al [12]. Liu et al [45] proposed a permission decision engine scheme for ABAC based on Random Forest [5].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Approaches have been proposed specifically for anomaly detection systems for network intrusion detection [33]. An initial evaluation of their use and comparison with decision trees for access control have been recently carried out [9]. However a major issue when using deep neural networks, as other machine learning algorithms, for security purposes is the scarcity of training data, especially when dealing with novel attacks.…”
Section: Different Contexts Same Monitorsmentioning
confidence: 99%