Abstract
A good direction towards building secure systems that operate efficiently in large-scale environments (like the World Wide Web) is the deployment of Role Based Access Control Methods (RBAC). RBAC architectures do not deal with each user separately, but with discrete roles that users can acquire in the system. The goal of this paper is to present a classification algorithm that during its training phase, classifies roles of the users in clusters. The behavior of each user that enters the system holding a specific role is traced via audit trails and any misbehavior is detected and reported (classification phase). This algorithm will be incorporated in the Role Server architecture, currently under development, enhancing its ability to dynamically adjust the amount of trust of each user and update the corresponding role assignments.
Keywords
- Intrusion Detection
- Anomaly Detection
- Intrusion Detection System
- Audit Data
- Role Base Access Control
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This research is supported by the CERIAS and NSF grants CCR-9901712 and CCR-0001788
This is a preview of subscription content, access via your institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Webtrends log analyzer. http://www.webtrends.com
R. Agrawal and R. Srikant: “Fast Algorithms for mining association rules”. In Proc. Of the 20th VLDB Conference, pages 487–499, Santiago, Chile, 1994
G-J. Ahn, R. Sandhu: “Role-based Authorization Constraints Specification”. ACM Transactions on Information and System Security, Vol. 3, No. 4, ACM, November 2000.
S. Axelsson: “ Intrusion Detection Systems: A Survey and Taxonomy”, Technical Report No 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, March 2000
A. Buchner and M. Mulvenna: “Discovering internet marketing intelligence throughout online analytical web usage mining”. SIGMOD Record, 27(4):54–61, 1998.
M.S. Chen, J.S. Park and P.S. Yu: “Data Mining for path traversal patterns in web environment”. In 16th International Conference on Distributed Computing Systems, pages 385–392, 1996.
R. Cooley, B. Mobasher and J. Srivastave: “Data preparation for mining world wide web browsing patterns”. Knowledge and Information Systems, 1(1), 1999.
B.S. Everitt: “Cluster Analysis”, Halsted Press, Third Edition, 1993
D. Fasulo: “An Analysis of Recent Work on Clustering Algorithms”, TR. Computer Sciences Dpt., Washington University, 1999.
A.D. Gordon: “Classification: Methods for Exploratory Analysis of Multivariate Data”. Chapman and Hall, 1981.
J. Han and M. Kambler: “Data Mining, Concepts and Techniques ”, Morgan Kaufmann Publishers
A.K. Jain and R.C. Dubes: “Algorithms for Clustering Data”. Prentice Hall, 1988.
A. Joshi and R. Krishnapuram: “On Mining Web Access Logs”. ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2000
L. Kaufman and P.J. Rousseeuw: “Finding Groups in Data: An Introduction to Cluster Analysis”, John Wiley & Sons, Inc, 1990.
R. Krishnapuram, A. Joshi, L. Yi: “A Fuzzy Relative of the k-Medoids Algorithm with Application to Web Document and Snippet Clustering”.
R. Krishnapuram and J. M. Keller: “A possibilistic approach to clustering”. IEEE Transactions on Fuzzy Systems, 1(2):98–110, May 1993
S. Kumar and E. Spafford: “A pattern Matching Model for Misuse Intrusion Detection”. In Proc. Of the 17th National Computer Security Conference, pp. 11–21, 1994.
S. Kumar and E. Spafford: “A software Architecture to Support Misuse Intrusion Detection”. Dpt. Of Computer Sciences, Purdue University, CDS_TR_95-009, 1995.
Terran Lane and Carla E. Brodley: “Temporal sequence learning and data reduction for anomaly detection”, ACM Transactions on Information Systems Security 2(3) (Aug. 1999), Pages 295–331.
W. Lee and S.J. Stolfo: “A Framework for Constructing Features and Models for Intrusion Detection Systems”, ACM Transactions on Information and Security, Vol.3, No. 4, pp. 227–261, November 2000
T. Lunt: “Detecting Intruders in Computer Systems”. Conference on Auditing and Computer Technology, 1993
T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, H. Javitz, A. Valdes and T. Garvey: “A real-time intrusion detection expert system (IDES)-final technical report”. Technical Report, Computer Science Laboratory, SRI International, Menlo Park, California, 1992.
H. Mannila, H. Toivonen and A.I. Verkamo: “Discovering Frequent Episodes in Sequences”. In Proc. Of the 1st International Conference on Knowledge Discovery and Data Mining, 1997.
O. Nasraoui, R. Krishnapuram and A. Joshi: “ Mining web access logs using fuzzy relational clustering algorithm based on robust estimator”. In 18th International World Wide Web Conference, Toronto, Canada, 1999.
J. S. Park, R. S. Sandhu, S. Ghanta: “RBAC on the Web by Secure Cookies”. Proc. of the IFIP Workshop on Database Security, pp. 49–62, 1999.
J. S. Park, R. S. Sandhu: “Smart certificates: Extending x.509 for secure attribute services on the web”. Proc. of the 22nd NIST-NCSC National Information Systems Security Conference, Arlington, VA, October 1999.
C. Shahabi, A. Zarkesh, J. Adibi and V. Shah: “Knowledge Discovery from users web page navigation”. In Workshop on Research Issues in Data Engineering, Birmingham, England, 1997.
N. Ye and X. Li: “ A Scalable Clustering Technique for Intrusion Signature Recognition”, Proc. Of Workshop on Information Assurance and Security, NY-USA, June 2001
Y. Zhong, B. Bhargava, M. Mahoui: “Trustworthiness Based Authorization on WWW”. Proc. of the Workshop on Security in Distributed Data Warehousing. New Orleans, 2001
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Terzi, E., Zhong, Y., Bhargava, B., Pankaj, Madria, S. (2002). An Algorithm for Building User-Role Profiles in a Trust Environment1 . In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds) Data Warehousing and Knowledge Discovery. DaWaK 2002. Lecture Notes in Computer Science, vol 2454. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46145-0_11
Download citation
DOI: https://doi.org/10.1007/3-540-46145-0_11
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44123-6
Online ISBN: 978-3-540-46145-6
eBook Packages: Springer Book Archive
