Visible to the public Mutated Policies: Towards Proactive Attribute-based Defenses for Access Control

TitleMutated Policies: Towards Proactive Attribute-based Defenses for Access Control
Publication TypeConference Paper
Year of Publication2017
AuthorsRubio-Medrano, Carlos E., Lamp, Josephine, Doupé, Adam, Zhao, Ziming, Ahn, Gail-Joon
Conference NameProceedings of the 2017 Workshop on Moving Target Defense
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5176-8
KeywordsAccess Control, attributes, Authorization, deterrence, Human Behavior, human factors, moving target defense, mutated policies, pubcrawl, resilience, Resiliency, Scalability
AbstractRecently, both academia and industry have recognized the need for leveraging real-time information for the purposes of specifying, enforcing and maintaining rich and flexible authorization policies. In such a context, security-related properties, a.k.a., attributes, have been recognized as a convenient abstraction for providing a well-defined representation of such information, allowing for them to be created and exchanged by different independently-run organizational domains for authorization purposes. However, attackers may attempt to compromise the way attributes are generated and communicated by recurring to hacking techniques, e.g., forgery, in an effort to bypass authorization policies and their corresponding enforcement mechanisms and gain unintended access to sensitive resources as a result. In this paper, we propose a novel technique that allows for enterprises to pro-actively collect attributes from the different entities involved in the access request process, e.g., users, subjects, protected resources, and running environments. After the collection, we aim to carefully select the attributes that uniquely identify the aforementioned entities, and randomly mutate the original access policies over time by adding additional policy rules constructed from the newly-identified attributes. This way, even when attackers are able to compromise the original attributes, our mutated policies may offer an additional layer of protection to deter ongoing and future attacks. We present the rationale and experimental results supporting our proposal, which provide evidence of its suitability for being deployed in practice.
URLhttp://doi.acm.org/10.1145/3140549.3140553
DOI10.1145/3140549.3140553
Citation Keyrubio-medrano_mutated_2017