skip to main content
10.1145/3626564.3629102acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
short-paper

Attacks and Defences for ML-enhanced Access Control

Published:11 December 2023Publication History

ABSTRACT

As technological systems grow in complexity, the task of managing authorisation and access control within distributed systems becomes increasingly daunting. Machine learning (ML) emerges as a solution capable of adapting to this intricate landscape by drawing insights from historical data and swiftly determining who should be granted access to specific resources. While the incorporation of machine learning into authorisation and access control yields numerous benefits, it also introduces concerns surrounding how to safeguard the integrity of these ML models that are deployed and utilised in a distributed setting. These challenges represent the focal point of this doctoral research endeavour. The primary objective of this study is to delve into the dynamics of attacks and defences within an hybrid access control middleware, which combines conventional rule-based policies with ML-based classifiers. Additionally, this research will explore managerial aspects essential for enabling dynamic and adaptive authorisation measures.

References

  1. Leila Karimi, Mai Abdelhakim, and James Joshi. 2021. Adaptive ABAC Policy Learning: A Reinforcement Learning Approach. arXiv:2105.08587 [cs.LG]Google ScholarGoogle Scholar
  2. Aodi Liu, Xuehui Du, and Na Wang. 2021. Efficient access control permission decision engine based on machine learning. Security and Communication Networks 2021 (2021), 1--11.Google ScholarGoogle Scholar
  3. Javier Martínez Llamas, Davy Preuveneers, and Wouter Joosen. 2023. Effective Machine Learning-based Access Control Administration through Unlearning. In 2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). 50--57. https://doi.org/10.1109/EuroSPW59978.2023.00011Google ScholarGoogle ScholarCross RefCross Ref
  4. Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, and Ravi Sandhu. 2022. Administration of Machine Learning Based Access Control. In Computer Security -- ESORICS 2022, Vijayalakshmi Atluri, Roberto Di Pietro, Christian D. Jensen, and Weizhi Meng (Eds.). Springer Nature Switzerland, Cham, 189--210.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami, and Ravi Sandhu. 2022. Toward Deep Learning Based Access Control. In Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy (Baltimore, MD, USA) (CODASPY '22). Association for Computing Machinery, New York, NY, USA, 143--154. https://doi.org/10.1145/3508398.3511497Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Mohammad Nur Nobi, Ram Krishnan, and Ravi Sandhu. 2022. Adversarial Attacks in Machine Learning Based Access Control. In Proceedings of the 1st Italian Conference on Big Data and Data Science (ITADATA 2022). 3--14. https://ceur-ws.org/Vol-3340/Google ScholarGoogle Scholar
  7. Daniel Servos and Sylvia L Osborn. 2017. Current research and open problems in attribute-based access control. ACM Computing Surveys (CSUR) 49, 4 (2017), 1--45.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Attacks and Defences for ML-enhanced Access Control
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            Middleware '23: Proceedings of the 24th International Middleware Conference: Demos, Posters and Doctoral Symposium
            December 2023
            41 pages
            ISBN:9798400704291
            DOI:10.1145/3626564

            Copyright © 2023 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 11 December 2023

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper
            • Research
            • Refereed limited

            Acceptance Rates

            Overall Acceptance Rate203of948submissions,21%
          • Article Metrics

            • Downloads (Last 12 months)29
            • Downloads (Last 6 weeks)3

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader