A Dynamic Access Control Method Facing Internal Attacks

A dynamic access control and internal attack technology, applied in transmission systems, electrical components, etc., can solve problems such as only considering, not considering constraints, and ignoring the cumulative risk of users, so as to prevent access, protect network resources, and prevent illegal and the effect of malicious access behavior

Active Publication Date: 2021-04-13
NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, the existing dynamic access control model dynamically adjusts the user's authority through context information to prevent external attacks brought by unauthorized users to the system. The existing risk-aware access control method analyzes the user's historical access behavior, Restricting users' access capabilities can solve internal attacks to a certain extent, but most of them only consider the risks brought by current access requests to the system, and do not consider the cumulative risks of users. At the same time, they do not consider strategic constraints.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Dynamic Access Control Method Facing Internal Attacks
  • A Dynamic Access Control Method Facing Internal Attacks
  • A Dynamic Access Control Method Facing Internal Attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] In order to make the technical solutions of the present invention clearer and clearer to those skilled in the art, the present invention will be further described in detail below in conjunction with the examples and accompanying drawings, but the embodiments of the present invention are not limited thereto.

[0076] Such as figure 1 As shown, the internal attack-oriented dynamic access control method of this embodiment specifically includes the following steps:

[0077] Step 1) Submit access request phase:

[0078] The user submits the current access request, the policy enforcement point intercepts the access request, and forwards the access request to the policy decision point. In the stage of submitting the access request, the access request contains two attributes: access user and access right, and the access right includes access activity and object;

[0079] Step 2) Calculation of user enabled role set:

[0080] According to the current environment model and the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic access control framework for internal attacks, belonging to the technical field of information security access control, including: submission of access requests, calculation of user enabled roles, calculation of role enabled permissions, selection of enabled roles, selection of candidate uses Reduction of functional roles, calculation of risk value, using the environment model to evaluate the satisfiability of the environment constraints in the access control strategy, realize the dynamic adjustment of user permissions, and prevent illegal users from accessing, and then, according to the policy constraints and risk analysis, Restrict the scope of authority of legitimate users to avoid internal attacks by malicious users. The present invention realizes triple control on access requests by analyzing environmental information, policy constraints, and access risks, can prevent illegal and malicious access behaviors in time, protect network resources more effectively, and ensure safe and efficient operation of the system.

Description

technical field [0001] The invention relates to a dynamic access control method, in particular to an internal attack-oriented dynamic access control method, and belongs to the technical field of information security access control. Background technique [0002] In order to correctly authorize all kinds of information resources on the network, at present, researchers mainly use access control mechanisms to block illegal users from accessing resources. But in real life, not all legitimate users are trusted users, and some legitimate users may abuse the obtained permissions and damage the use of enterprises. , 28% of respondents said they had suffered internal attacks, and 32% of respondents believed that internal attacks were more harmful than external attacks. [0003] The role-based access control model RBAC can effectively reduce the complexity of authorization management compared with other access control models, such as mandatory access control and autonomous access cont...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/102
Inventor 黄志球曹彦杨阳吴德香王子豪
Owner NANJING UNIV OF AERONAUTICS & ASTRONAUTICS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products