Invalidating Policies using Structural Information

Florian Kammuller, Christian W. Probst

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

Insider threats are a major threat to many organisations. Even worse, insider attacks are usually hard to detect, especially if an attack is based on actions that the attacker has the right to perform. In this paper we present a step towards detecting the risk for this kind of attacks by invalidating policies using structural information of the organisational model. Based on this structural information and a description of the organisation's policies, our approach invalidates the policies and identifies exemplary sequences of actions that lead to a violation of the policy in question. Based on these examples, the organisation can identify real attack vectors that might result in an insider attack. This information can be used to refine access control system or policies.
Original languageEnglish
Title of host publication2013 IEEE Security and Privacy Workshops
PublisherIEEE
Publication date2013
Pages76-81
ISBN (Print)978-1-4799-0458-7
DOIs
Publication statusPublished - 2013
Event2013 IEEE Security and Privacy Workshops (SPW) - San Francisco, CA, United States
Duration: 23 May 201324 May 2013
http://www.ieee-security.org/TC/SPW2013/

Workshop

Workshop2013 IEEE Security and Privacy Workshops (SPW)
Country/TerritoryUnited States
CitySan Francisco, CA
Period23/05/201324/05/2013
Internet address

Fingerprint

Dive into the research topics of 'Invalidating Policies using Structural Information'. Together they form a unique fingerprint.

Cite this