• DocumentCode
    2510071
  • Title

    Analysing Access Control Specifications

  • Author

    Probst, Christian W. ; Hansen, René Rydhof

  • Author_Institution
    Tech. Univ. of Denmark, Lyngby, Denmark
  • fYear
    2009
  • fDate
    21-21 May 2009
  • Firstpage
    22
  • Lastpage
    33
  • Abstract
    When prosecuting crimes, the main question to answer is often who had a motive and the possibility to commit the crime. When investigating cyber crimes, the question of possibility is often hard to answer, as in a networked system almost any location can be accessed from almost anywhere. The most common tool to answer this question, analysis of log files, faces the problem that the amount of logged data may be overwhelming. This problems gets even worse in the case of insider attacks, where the attacker\´s actions usually will be logged as permissible, standard actions-if they are logged at all. Recent events have revealed intimate knowledge of surveillance and control systems on the side of the attacker, making it often impossible to deduce the identity of an inside attacker from logged data. In this work we present an approach that analyses the access control configuration to identify the set of credentials needed to reach a certain location in a system. This knowledge allows to identify a set of (inside) actors who have the possibility to commit an insider attack at that location. This has immediate applications in analysing log files, but also non-technical applications such as identifying possible suspects, or, beyond cyber crimes, picking the "best" actor for a certain task. We also sketch an online analysis that identifies where an actor can be located based on observed actions.
  • Keywords
    authorisation; computer crime; access control configuration; access control specification analysis; cyber crime analysis; log file analysis; nontechnical application; online analysis; prosecuting crime; surveillance system; Access control; Companies; Conferences; Control system analysis; Control systems; Digital forensics; Information systems; Measurement standards; Network servers; Surveillance; access control; log file analysis;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Systematic Approaches to Digital Forensic Engineering, 2009. SADFE '09. Fourth International IEEE Workshop on
  • Conference_Location
    Berkeley, CA
  • Print_ISBN
    978-0-7695-3792-4
  • Type

    conf

  • DOI
    10.1109/SADFE.2009.13
  • Filename
    5341548