To ease the burden of implementing and maintaining access-control aspects in a system, a growing trend among developers is to write access-control policies in a specification language such as XACML and integrate the policies with applications through the use of a policy decision point (PDP). To assure that the specified polices reflect the expected ones, recent research has developed policy verification tools; however, their applications in practice are still limited, being constrained by the limited set of supported policy language features and the unavailability of policy properties. This paper presents a data-mining approach to the problem of verifying that expressed access-control policies reflect the true desires of the policy author. We developed a tool to investigate this approach by automatically generating requests, evaluating those requests to get responses, and applying machine learning on the request-response pairs to infer policy properties. These inferred properties facilitate the inspection of the policy behavior. We applied our tool on an access-control policy of a central grades repository system for a university. Our results show that machine learning algorithms can provide valuable insight into basic policy properties and help identify specific bug-exposing requests
[1]
Mark Ryan,et al.
Synthesising verified access control systems in XACML
,
2004,
FMSE '04.
[2]
Jadzia Cendrowska,et al.
PRISM: An Algorithm for Inducing Modular Rules
,
1987,
Int. J. Man Mach. Stud..
[3]
Mark Ryan,et al.
Evaluating Access Control Policies Through Model Checking
,
2005,
ISC.
[4]
Manu Sridharan,et al.
A micromodularity mechanism
,
2001,
ESEC/FSE-9.
[5]
Tevfik Bultan,et al.
Automated Verification of Access Control Policies
,
2004
.
[6]
Mark Burgess,et al.
Probabilistic anomaly detection in distributed computer networks
,
2006,
Sci. Comput. Program..
[7]
Kathi Fisler,et al.
Verification and change-impact analysis of access-control policies
,
2005,
Proceedings. 27th International Conference on Software Engineering, 2005. ICSE 2005..