Advertisement

Fuzzy Rules Based Solution for System Administration Security Management via a Blockchain

  • Arnaud Castelltort
  • Antoine Chabert
  • Nicolas Hersog
  • Anne LaurentEmail author
  • Michel Sala
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1010)

Abstract

Digital transformation has led to the fact that almost all organizations and companies are provided with internal private networks and manage sensitive data and applications. In this context, system administrators are superusers who can access all this sensitive material. As it is known that many frauds are caused by internal actions, we argue that it is important to be provided with strong automated logging systems even for superusers. For this purpose, blockchains are an efficient solution as they cannot be overwritten by the system administrators. However, as it is not efficient to store all the actions, we introduce in this paper a novel system based on fuzzy rules in order to efficiently manage the system logging system in a blockchain.

Keywords

Blockchain Fuzzy rules System administration Log files Fraud detection 

Notes

Acknowledgments

The authors would like to thank Loïc Combis, Kevin Hassan, and Hugo Maitre, students from Polytech Montpellier, for their help for implementing and testing the approach.

References

  1. 1.
    Alneyadi, S., Sithirasenan, E., Muthukkumarasamy, V.: A survey on data leakage prevention systems. J. Netw. Comput. Appl. 62(C), 137–152 (2016)CrossRefGoogle Scholar
  2. 2.
    Al Amro, S., Chiclana, F., Elizondo, D.A.: Application of fuzzy logic in computer security and forensics. In: Elizondo, D.A., Solanas, A., Martínez-Ballesté, A. (eds.) Computational Intelligence for Privacy and Security, vol. 394. Studies in Computational Intelligence, pp. 35–49. Springer (2012)Google Scholar
  3. 3.
    Bellman, R.E., Zadeh, L.A.: Decision-making in a fuzzy environment. Manag. Sci. 17(4), B-141–B-164 (1970)MathSciNetCrossRefGoogle Scholar
  4. 4.
    Chen, R.-Y.: A traceability chain algorithm for artificial neural networks using T-S fuzzy cognitive maps in blockchain. Futur. Gener. Comput. Syst. 80, 198–210 (2018)CrossRefGoogle Scholar
  5. 5.
    Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y., Ochoa, M.: Insight into insiders: a survey of insider threat taxonomies, analysis, modeling, and countermeasures. CoRR (2018). arXiv:abs/1805.01612
  6. 6.
    Kaga, Y., Fujio, M., Naganuma, K., Takahashi, K., Murakami, T., Ohki, T., Nishigaki, M.: A secure and practical signature scheme for blockchain based on biometrics. In: Liu, J.K., Samarati, P. (eds.) Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, 13–15 December, 2017, Proceedings. LNCS, vol. 10701, pp. 877–891. Springer (2017)Google Scholar
  7. 7.
    Marwala, T., Xing, B.: Blockchain and artificial intelligence. CoRR (2018). arXiv:abs/1802.04451
  8. 8.
    Spitzner, L.: Honeypots: catching the insider threat. In: Proceedings of the 19th Annual Computer Security Applications Conference, ACSAC 2003, p. 170. IEEE Computer Society, Washington, DC (2003)Google Scholar
  9. 9.
    Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog computing: mitigating insider data theft attacks in the cloud. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, SPW 2012, pp. 125–128. IEEE Computer Society, Washington, DC (2012)Google Scholar
  10. 10.
    Trzeciak, R.F.: SEI cyber minute: insider threats (2017). http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=496626
  11. 11.
    Xu, H., Tang, R.: Study and improvements for the real-time performance of Linux kernel. In: 2010 3rd International Conference on Biomedical Engineering and Informatics, vol. 7, pp. 2766–2769, October 2010Google Scholar
  12. 12.
    Zhao, K., Li, Q., Kang, J., Jiang, D., Hu, L.: Design and implementation of secure auditing system in Linux kernel. In: 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), pp. 232–236, April 2007Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Arnaud Castelltort
    • 1
  • Antoine Chabert
    • 2
  • Nicolas Hersog
    • 2
  • Anne Laurent
    • 1
    Email author
  • Michel Sala
    • 1
  1. 1.Univ Montpellier, LIRMM, CNRSMontpellierFrance
  2. 2.ChainHeroMontpellierFrance

Personalised recommendations