A data classification method for inconsistency and incompleteness detection in access control policy sets

Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo

Research output: Contribution to journalArticlepeer-review

28 Citations (Scopus)

Abstract

Access control policies may contain anomalies such as incompleteness and inconsistency, which can result in security vulnerabilities. Detecting such anomalies in large sets of complex policies automatically is a difficult and challenging problem. In this paper, we propose a novel method for detecting inconsistency and incompleteness in access control policies with the help of data classification tools well known in data mining. Our proposed method consists of three phases: firstly, we perform parsing on the policy data set; this includes ordering of attributes and normalization of Boolean expressions. Secondly, we generate decision trees with the help of our proposed algorithm, which is a modification of the well-known C4.5 algorithm. Thirdly, we execute our proposed anomaly detection algorithm on the resulting decision trees. The results of the anomaly detection algorithm are presented to the policy administrator who will take remediation measures. In contrast to other known policy validation methods, our method provides means for handling incompleteness, continuous values and complex Boolean expressions. In order to demonstrate the efficiency of our method in discovering inconsistencies, incompleteness and redundancies in access control policies, we also provide a proof-of-concept implementation.

Original languageEnglish
Pages (from-to)91-113
Number of pages23
JournalInternational Journal of Information Security
Volume16
Issue number1
DOIs
Publication statusPublished - 1 Feb 2017

Keywords

  • Access control
  • Data classification
  • Incompleteness
  • Inconsistency
  • Policy validation
  • Redundancy

Cite this