Skip to main content

Security Rules Identification and Validation: The Role of Explainable Clustering and Information Visualisation

  • Conference paper
  • First Online:
HCI International 2021 - Posters (HCII 2021)

Abstract

In the context of data access and export control from enterprise information systems, one of the issue is the generation of the rules. Currently, this time consuming and difficult task is highly based on experience. Expert security analysts merge their experience of Enterprise Resource Planning (ERP) systems with the random exploration of the logs generated by the system to try to envision the most relevant attack paths. This project allowed to explore different approaches for creating support for human experts in security rule identification and validation, while preserving interpretability of the results and inspectability of the approach used. This resulted in a tool that complements the security engine by supporting experts in defining uncommon patterns as security-related events to be monitored and vetted by the event classification engine. The result is a promising instrument allowing the human inspection of candidate security-related relevant events/patterns. Main focus being the definition of security rules to be enforced by the specific security engine at run-time. An initial evaluation round shows a positive trend into the users’ perception, even tough a miss of contextual information still hinders its usage by more business-oriented profiles.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Al-Mashari, M., Al-Mudimigh, A., Zairi, M.: Enterprise resource planning: a taxonomy of critical factors. Eur. J. Oper. Res. 146(2), 352–364 (2003)

    Article  Google Scholar 

  2. Breunig, M., Kriegel, H.P., Ng, R., Sander, J.: LOF: identifying density-based local outliers. vol. 29, pp. 93–104, June 2000. https://doi.org/10.1145/342009.335388

  3. Dekhtiar, J., Durupt, A., Bricogne, M., Eynard, B., Rowson, H., Kiritsis, D.: Deep learning for big data applications in CAD and PLM-research review, opportunities and case study. Comput. Ind. 100, 227–243 (2018)

    Article  Google Scholar 

  4. Ester, M., Kriegel, H.P., Sander, J., Xu, X., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, vol. 96, pp. 226–231 (1996)

    Google Scholar 

  5. Kamarudin, M.H., Maple, C., Watson, T., Safa, N.S.: A logitboost-based algorithm for detecting known and unknown web attacks. IEEE Access 5, 26190–26200 (2017)

    Article  Google Scholar 

  6. Kim, B., Pardo, B.: A human-in-the-loop system for sound event detection and annotation. ACM Trans. Interact. Intell. Syst. (TiiS) 8(2), 1–23 (2018)

    Article  Google Scholar 

  7. Kim, T., Hong, H., Magerko, B.: Designing for persuasion: toward ambient eco-visualization for awareness. In: Ploug, T., Hasle, P., Oinas-Kukkonen, H. (eds.) PERSUASIVE 2010. LNCS, vol. 6137, pp. 106–116. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-13226-1_12

    Chapter  Google Scholar 

  8. Lanza, M., Hattori, L., Guzzi, A.: Supporting collaboration awareness with real-time visualization of development activity. In: 2010 14th European Conference on Software Maintenance and Reengineering, pp. 202–211. IEEE (2010)

    Google Scholar 

  9. McInnes, L., Healy, J.: Accelerated hierarchical density based clustering. In: 2017 IEEE International Conference on Data Mining Workshops (ICDMW), pp. 33–42. IEEE (2017)

    Google Scholar 

  10. Monk, E., Wagner, B.: Concepts in Enterprise Resource Planning. Cengage Learning, Boston (2012)

    Google Scholar 

  11. Ning, P., Jajodia, S.: Intrusion detection techniques. The Internet Encyclopedia (2004)

    Google Scholar 

  12. Riveiro, M., Falkman, G., Ziemke, T.: Improving maritime anomaly detection and situation awareness through interactive visualization. In: 2008 11th International Conference on Information Fusion, pp. 1–8. IEEE (2008)

    Google Scholar 

  13. Sanders, N.R.: Big Data Driven Supply Chain Management: A Framework for Implementing Analytics and Turning Information into Intelligence. Pearson Education, London (2014)

    Google Scholar 

  14. Schreyer, M., Sattarov, T., Reimer, B., Borth, D.: Adversarial learning of deepfakes in accounting. arXiv preprint arXiv:1910.03810 (2019)

  15. Schubert, E., Sander, J., Ester, M., Kriegel, H.P., Xu, X.: DBSCAN revisited, revisited: why and how you should (still) use DBSCAN. ACM Trans. Database Syst. (TODS) 42(3), 1–21 (2017)

    Article  MathSciNet  Google Scholar 

  16. She, W., Thuraisingham, B.: Security for enterprise resource planning systems. Inf. Syst. Secur. 16(3), 152–163 (2007)

    Article  Google Scholar 

  17. Valkanova, N., Jorda, S., Tomitsch, M., Vande Moere, A.: Reveal-it! the impact of a social visualization projection on public awareness and discourse. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 3461–3470 (2013)

    Google Scholar 

  18. Wiegenstein, A., Schumacher, M., Jia, X.: Apparatus and method for detecting, prioritizing and fixing security defects and compliance violations in SAP® ABAP code, US Patent 8,402,547, 19 Mar 2013

    Google Scholar 

Download references

Acknowledgement

The research leading to this work was partially financed by Innosuisse - Swiss federal agency for Innovation, through a competitive call. The project 29926.1 IP-ICT is called IAC: Intelligent Automatic Configuration (https://www.aramis.admin.ch/Grunddaten/?ProjectID=42722). The authors would like to thanks all the people involved on the implementation-side at SECUDE International AG (https://secude.com/) for all the constructive and fruitful discussions and insight into the functioning of a security engine and the characterisation of security event types. Final Note: the work briefly described here is under review for an U.S. Patent, with application number 17/174,837.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Luca Mazzola .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mazzola, L. et al. (2021). Security Rules Identification and Validation: The Role of Explainable Clustering and Information Visualisation. In: Stephanidis, C., Antona, M., Ntoa, S. (eds) HCI International 2021 - Posters. HCII 2021. Communications in Computer and Information Science, vol 1420. Springer, Cham. https://doi.org/10.1007/978-3-030-78642-7_58

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-78642-7_58

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-78641-0

  • Online ISBN: 978-3-030-78642-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics