OPMonitor:持续监控已验证的访问控制策略中剩余的超额权限

IF 5.4 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS
Xiao Wang , Yunchuan Guo , Zhe Sun , Mingjie Yu , Fenghua Li , Liang Fang
{"title":"OPMonitor:持续监控已验证的访问控制策略中剩余的超额权限","authors":"Xiao Wang ,&nbsp;Yunchuan Guo ,&nbsp;Zhe Sun ,&nbsp;Mingjie Yu ,&nbsp;Fenghua Li ,&nbsp;Liang Fang","doi":"10.1016/j.cose.2025.104623","DOIUrl":null,"url":null,"abstract":"<div><div>Over-permissive access control policies, which grant users permissions beyond sysadmins’ intended scope, are a primary cause of data breaches. Although policy verification serves as a critical defense mechanism by formalizing design intentions into verification goals and validating policies compliance with these goals, its effectiveness bounded by sysadmins’ expertise and the comprehensiveness of predefined intentions. Consequently, over-granted permissions which fall outside the scope of verification goals often remain undetected. This paper introduces <em>OPMonitor</em>, a continuous monitoring tool that enables early detection of residual over-granted permissions overlooked by policy verification methods. <em>OPMonitor</em> operates by inferring a granting baseline from access logs, which serves as a reference model for identifying access violations in real time. To mitigate over-permissive results while ensuring correctness, we develop a two-phase framework based on approximate optimization for baseline inference. To facilitate real-time evaluation and incremental updates of the inferred baseline, we develop the locally abstract baseline tree, a tree structure that consolidates implicit authorization conditions to reduce the scale of states. Our experimental evaluation across 25 datasets, comprising both real-world and synthetic data, demonstrates the effectiveness of our approach. <em>OPMonitor</em> achieves a 1.5x higher detection rate for over-granted permissions compared to state-of-the-art solutions, while keeping the inference time under 30 s. Additionally, our locally abstract baseline tree enables microsecond-level evaluation and incremental updates that are 7x and 2x faster, respectively, than existing approaches.</div></div>","PeriodicalId":51004,"journal":{"name":"Computers & Security","volume":"158 ","pages":"Article 104623"},"PeriodicalIF":5.4000,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"OPMonitor: Continuously monitoring residual over-granted permissions in verified access control policies\",\"authors\":\"Xiao Wang ,&nbsp;Yunchuan Guo ,&nbsp;Zhe Sun ,&nbsp;Mingjie Yu ,&nbsp;Fenghua Li ,&nbsp;Liang Fang\",\"doi\":\"10.1016/j.cose.2025.104623\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Over-permissive access control policies, which grant users permissions beyond sysadmins’ intended scope, are a primary cause of data breaches. Although policy verification serves as a critical defense mechanism by formalizing design intentions into verification goals and validating policies compliance with these goals, its effectiveness bounded by sysadmins’ expertise and the comprehensiveness of predefined intentions. Consequently, over-granted permissions which fall outside the scope of verification goals often remain undetected. This paper introduces <em>OPMonitor</em>, a continuous monitoring tool that enables early detection of residual over-granted permissions overlooked by policy verification methods. <em>OPMonitor</em> operates by inferring a granting baseline from access logs, which serves as a reference model for identifying access violations in real time. To mitigate over-permissive results while ensuring correctness, we develop a two-phase framework based on approximate optimization for baseline inference. To facilitate real-time evaluation and incremental updates of the inferred baseline, we develop the locally abstract baseline tree, a tree structure that consolidates implicit authorization conditions to reduce the scale of states. Our experimental evaluation across 25 datasets, comprising both real-world and synthetic data, demonstrates the effectiveness of our approach. <em>OPMonitor</em> achieves a 1.5x higher detection rate for over-granted permissions compared to state-of-the-art solutions, while keeping the inference time under 30 s. Additionally, our locally abstract baseline tree enables microsecond-level evaluation and incremental updates that are 7x and 2x faster, respectively, than existing approaches.</div></div>\",\"PeriodicalId\":51004,\"journal\":{\"name\":\"Computers & Security\",\"volume\":\"158 \",\"pages\":\"Article 104623\"},\"PeriodicalIF\":5.4000,\"publicationDate\":\"2025-08-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computers & Security\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0167404825003128\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Security","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167404825003128","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

过度授权的访问控制策略(授予用户超出系统管理员预期范围的权限)是导致数据泄露的主要原因。尽管策略验证作为一种关键的防御机制,通过将设计意图形式化为验证目标,并验证策略是否符合这些目标,但其有效性受到系统管理员的专业知识和预定义意图的全面性的限制。因此,超出验证目标范围的过度授予的权限通常不会被检测到。本文介绍了OPMonitor,一种连续监控工具,可以早期发现被策略验证方法忽略的剩余超额授权权限。OPMonitor通过从访问日志中推断授权基线来运行,该基线作为实时识别访问违规的参考模型。为了在确保正确性的同时减少过度许可的结果,我们开发了一个基于基线推断近似优化的两阶段框架。为了便于实时评估和增量更新推断基线,我们开发了局部抽象基线树,这是一种整合隐式授权条件以减少状态规模的树结构。我们对25个数据集的实验评估,包括真实世界和合成数据,证明了我们方法的有效性。与最先进的解决方案相比,OPMonitor对过度授予的权限的检测率提高了1.5倍,同时将推理时间保持在30秒以下。此外,我们的局部抽象基线树支持微秒级的评估和增量更新,分别比现有方法快7倍和2倍。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
OPMonitor: Continuously monitoring residual over-granted permissions in verified access control policies
Over-permissive access control policies, which grant users permissions beyond sysadmins’ intended scope, are a primary cause of data breaches. Although policy verification serves as a critical defense mechanism by formalizing design intentions into verification goals and validating policies compliance with these goals, its effectiveness bounded by sysadmins’ expertise and the comprehensiveness of predefined intentions. Consequently, over-granted permissions which fall outside the scope of verification goals often remain undetected. This paper introduces OPMonitor, a continuous monitoring tool that enables early detection of residual over-granted permissions overlooked by policy verification methods. OPMonitor operates by inferring a granting baseline from access logs, which serves as a reference model for identifying access violations in real time. To mitigate over-permissive results while ensuring correctness, we develop a two-phase framework based on approximate optimization for baseline inference. To facilitate real-time evaluation and incremental updates of the inferred baseline, we develop the locally abstract baseline tree, a tree structure that consolidates implicit authorization conditions to reduce the scale of states. Our experimental evaluation across 25 datasets, comprising both real-world and synthetic data, demonstrates the effectiveness of our approach. OPMonitor achieves a 1.5x higher detection rate for over-granted permissions compared to state-of-the-art solutions, while keeping the inference time under 30 s. Additionally, our locally abstract baseline tree enables microsecond-level evaluation and incremental updates that are 7x and 2x faster, respectively, than existing approaches.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Computers & Security
Computers & Security 工程技术-计算机:信息系统
CiteScore
12.40
自引率
7.10%
发文量
365
审稿时长
10.7 months
期刊介绍: Computers & Security is the most respected technical journal in the IT security field. With its high-profile editorial board and informative regular features and columns, the journal is essential reading for IT security professionals around the world. Computers & Security provides you with a unique blend of leading edge research and sound practical management advice. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia. Recognized worldwide as THE primary source of reference for applied research and technical expertise it is your first step to fully secure systems.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信