...
首页> 外文期刊>Expert Systems with Application >Auditing file system permissions using association rule mining
【24h】

Auditing file system permissions using association rule mining

机译:使用关联规则挖掘审核文件系统权限

获取原文
获取原文并翻译 | 示例
           

摘要

Identifying irregular file system permissions in large, multi-user systems is challenging due to the complexity of gaining structural understanding from large volumes of permission information. This challenge is exacerbated when file systems permissions are allocated in an ad-hoc manner when new access rights are required, and when access rights become redundant as users change job roles or terminate employment. These factors make it challenging to identify what can be classed as an irregular file system permission, as well as identifying if they are irregular and exposing a vulnerability. The current way of finding such irregularities is by performing an exhaustive audit of the permission distribution; however, this requires expert knowledge and a significant amount of time. In this paper a novel method of modelling file system permissions which can be used by association rule mining techniques to identify irregular permissions is presented. This results in the creation of object-centric model as a by-product. This technique is then implemented and tested on Microsoft's New Technology File System permissions (NTFS). Empirical observations are derived by making comparisons with expert knowledge to determine the effectiveness of the proposed technique on five diverse real-world directory structures extracted from different organisations. The results demonstrate that the technique is able to correctly identify irregularities with an average accuracy rate of 91%, minimising the reliance on expert knowledge. Experiments are also performed on synthetic directory structures which demonstrate an accuracy rate of 95% when the number of irregular permissions constitutes 1% of the total number. This is a significant contribution as it creates the possibility of identifying vulnerabilities without prior knowledge of how to file systems permissions are implemented within a directory structure. (C) 2016 Elsevier Ltd. All rights reserved.
机译:由于要从大量的权限信息中获得结构性的理解非常复杂,因此在大型的多用户系统中识别不规则的文件系统权限非常具有挑战性。当需要新的访问权限时以临时方式分配文件系统权限,并且当用户更改工作角色或终止雇用时访问权限变得多余时,这一挑战会更加严峻。这些因素使确定什么可以归类为不规则文件系统许可,以及确定它们是否不规则并暴露漏洞具有挑战性。当前发现此类违规行为的方法是对权限分配进行详尽的审核。但是,这需要专业知识和大量时间。本文提出了一种新的文件系统权限建模方法,关联规则挖掘技术可以使用该方法来识别不规则权限。这导致创建了以对象为中心的模型作为副产品。然后在Microsoft的新技术文件系统权限(NTFS)上实施和测试此技术。通过与专家知识进行比较来确定建议的技术对从不同组织提取的五个不同的现实世界目录结构的有效性,从而得出经验性观察。结果表明,该技术能够以91%的平均准确率正确识别违规行为,从而最大限度地减少了对专家知识的依赖。还对合成目录结构进行了实验,当不规则权限的数量占总数的1%时,合成目录结构的准确率达到95%。这是一项重要的贡献,因为它在无需事先了解如何在目录结构中实现文件系统权限的情况下,提供了识别漏洞的可能性。 (C)2016 Elsevier Ltd.保留所有权利。

著录项

  • 来源
    《Expert Systems with Application》 |2016年第8期|274-283|共10页
  • 作者单位

    Univ Huddersfield, Sch Comp & Engn, Dept Informat, Huddersfield HD1 3DH, W Yorkshire, England;

    Univ Huddersfield, Sch Comp & Engn, Dept Informat, Huddersfield HD1 3DH, W Yorkshire, England;

    Univ Huddersfield, Sch Comp & Engn, Dept Informat, Huddersfield HD1 3DH, W Yorkshire, England;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

    Access control; Auditing; Association rule mining;

    机译:访问控制;审计;关联规则挖掘;

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号