2018 IEEE International Conference on Big Data (Big Data) 2018
DOI: 10.1109/bigdata.2018.8622610
|View full text |Cite
|
Sign up to set email alerts
|

Validation and Correction of Large Security Policies: A Clustering and Access Log Based Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Also, only minimum rules are similar in a cluster, and this leads to complexities in detecting and removing anomalies [22]. Unlike the rule-sub-modulereduction method [21], we merge the cluster at the time of the creation of the cluster itself, which increases the performance of the approach. In our previous work [28], we introduced the parameter priority-level to avoid the anomaly conflict-demand and reduce the more number of clusters.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Also, only minimum rules are similar in a cluster, and this leads to complexities in detecting and removing anomalies [22]. Unlike the rule-sub-modulereduction method [21], we merge the cluster at the time of the creation of the cluster itself, which increases the performance of the approach. In our previous work [28], we introduced the parameter priority-level to avoid the anomaly conflict-demand and reduce the more number of clusters.…”
Section: Resultsmentioning
confidence: 99%
“…MaryemAit El Hadj, Mohammed Erradi, and their team proposed an approach to cluster the security policies and additionally used the information of access log to detect the fraud intruders. They used the KNN algorithm to cluster the security rules and applied the rule-sub-module-reduction technique to minimize the count of rules in each cluster [21]. MaryemAit El Hadj and his team proposed a clustering approach to cluster XACML (eXtensible Access Control Markup Language ) policies.…”
Section: Related Workmentioning
confidence: 99%
“…section 5.1.2) and is hence an important tool for ACP quality assessment. Moreover, the usage of an ACP is an indicator of its relevance, assuming that an ACP that is often invoked is more important than one that is scarcely invoked (Pan et al, 2018;Hadj et al, 2018a).…”
Section: Established Quality Criteriamentioning
confidence: 99%
“…Clustering [44] Triage Malware Analysis Reinforcement Learning/Ranking [47] Risk Assessment Regression [66] Forensics Attribution Clustering [132] Object Recognition…”
Section: Log Analysismentioning
confidence: 99%