skip to main content
10.1145/1389095.1389395acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
research-article

MLS security policy evolution with genetic programming

Published: 12 July 2008 Publication History

Abstract

In the early days a policy was a set of simple rules with a clear intuitive motivation that could be formalised to good effect. However the world is becoming much more complex. Subtle risk decisions may often need to be made and people are not always adept at expressing rationale for what they do. In this paper we investigate how policies can be inferred automatically using Genetic Programming (GP) from examples of decisions made. This allows us to discover a policy that may not formally have been documented, or else extract an underlying set of requirements by interpreting user decisions to posed "what if" scenarios. Three proof of concept experiments on MLS Bell-LaPadula, Budgetised MLS and Fuzzy MLS policies have been carried out. The results show this approach is promising.

References

[1]
P. C. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A. S. Reninger. Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. Technical report, IBM Research Report RC24190, 2007.
[2]
P. C. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A. S. Reninger. Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. IEEE Symposium on Security and Privacy, pages 222--230, 2007.
[3]
Horizontal Integration: Broader Access Models for Realizing Information Dominance. Technical Report JSR-04-132, The MITRE Corporation JASON Program Office, Mclean, Virginia, Dec 2004.
[4]
J. R. Koza. Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press, Cambridge, MA, USA, 1992.
[5]
S. Luke. ECJ version 16 A Java-based Evolutionary Computation Research System, August 2007.
[6]
P. D. McDaniel. Policy Evolution: Autonomic Environmental Security, December 2004.
[7]
R. R. F. Mendes, F. de B. Voznika, J. C. Nievola, and A. A. Freitas. Discovering Fuzzy Classification Rules with Genetic Programming and Co-Evolution. In L. Spector, E. D. Goodman, A. Wu, W. B. Langdon, H.-M. Voigt, M. Gen, S. Sen, M. Dorigo, S. Pezeshk, M. H. Garzon, and E. Burke, editors, Proceedings of the Genetic and Evolutionary Computation Conference (GECCO-2001), page 183, San Francisco, California, USA, 7--11 2001. Morgan Kaufmann.
[8]
D. J. Montana. Strongly Typed Genetic Programming. Evolutionary Computation, 3(2):199--230, 1995.
[9]
G. Pappa and A. Freitas. Towards a genetic programming algorithm for automatically evolving rule induction algorithms. In J. Furnkranz, editor, Proc. ECML/PKDD-2004 Workshop on Advances in Inductive Learning, pages 93--108, Pisa, Italy, September 2004.
[10]
M. L. Wong and K. S. Leung. Data Mining Using Grammar Based Genetic Programming and Applications, volume 3 of Genetic Programming. Kluwer Academic Publishers, Jan. 2000.

Cited By

View all
  • (2017)Evolutionary computation in network management and securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3067695.3067726(1094-1112)Online publication date: 15-Jul-2017
  • (2016)A Language and an Inference Engine for Twitter Filtering Rules2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)10.1109/WI.2016.0107(614-617)Online publication date: Oct-2016
  • (2015)Soft Computing Techniques Applied to Corporate and Personal SecurityProceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation10.1145/2739482.2768477(1193-1196)Online publication date: 11-Jul-2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GECCO '08: Proceedings of the 10th annual conference on Genetic and evolutionary computation
July 2008
1814 pages
ISBN:9781605581309
DOI:10.1145/1389095
  • Conference Chair:
  • Conor Ryan,
  • Editor:
  • Maarten Keijzer
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 July 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. MLS
  2. genetic programming
  3. policy inference
  4. security policy

Qualifiers

  • Research-article

Conference

GECCO08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 20 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Evolutionary computation in network management and securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3067695.3067726(1094-1112)Online publication date: 15-Jul-2017
  • (2016)A Language and an Inference Engine for Twitter Filtering Rules2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI)10.1109/WI.2016.0107(614-617)Online publication date: Oct-2016
  • (2015)Soft Computing Techniques Applied to Corporate and Personal SecurityProceedings of the Companion Publication of the 2015 Annual Conference on Genetic and Evolutionary Computation10.1145/2739482.2768477(1193-1196)Online publication date: 11-Jul-2015
  • (2015)An Improved Decision System for URL Accesses Based on a Rough Feature Selection TechniqueRecent Advances in Computational Intelligence in Defense and Security10.1007/978-3-319-26450-9_6(139-167)Online publication date: 20-Dec-2015
  • (2015)Evolutionary Inference of Attribute-Based Access Control PoliciesEvolutionary Multi-Criterion Optimization10.1007/978-3-319-15934-8_24(351-365)Online publication date: 18-Mar-2015
  • (2014)Enforcing corporate security policies via computational intelligence techniquesProceedings of the Companion Publication of the 2014 Annual Conference on Genetic and Evolutionary Computation10.1145/2598394.2605438(1245-1252)Online publication date: 12-Jul-2014
  • (2012)Risk-based adaptive security for smart IoT in eHealthProceedings of the 7th International Conference on Body Area Networks10.5555/2442691.2442752(269-275)Online publication date: 24-Feb-2012
  • (2010)Learning Autonomic Security Reconfiguration PoliciesProceedings of the 2010 10th IEEE International Conference on Computer and Information Technology10.1109/CIT.2010.168(902-909)Online publication date: 29-Jun-2010
  • (2009)Dynamic security policy learningProceedings of the first ACM workshop on Information security governance10.1145/1655168.1655177(39-48)Online publication date: 13-Nov-2009
  • (2008)Policy evolution with Genetic Programming: A comparison of three approaches2008 IEEE Congress on Evolutionary Computation (IEEE World Congress on Computational Intelligence)10.1109/CEC.2008.4631032(1792-1800)Online publication date: Jun-2008
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media