Log content extraction engine based on ontology for the purpose of a posteriori access control Online publication date: Sat, 31-Jan-2015
by Hanieh Azkia; Nora Cuppens-Boulahia; Frédéric Cuppens; Gouenou Coatrieux
International Journal of Knowledge and Learning (IJKL), Vol. 9, No. 1/2, 2014
Abstract: In some complex information systems, users do not undergo untimely access controls. Generally, whenever they perform an action, this action is logged by the target system. Based on these log files, a security control called a posteriori access control is made afterwards. The logged data can be recorded in different formats (Syslog, W3C extend log, specific domain log standard like IHE-ATNA, etc.). An a posteriori security control framework requires a log filtering engine which extracts useful information regardless of the log format used. In this paper, we define and enforce this extraction function by building an ontology model of logs. This logs ontology is queried to check the compliance of actions performed by the users of the considered system with its access control policy (violations, anomalies, fulfilments, etc.). We show how the a posteriori security controls are made effective and how security decisions are made easier based on this extraction function.
Online publication date: Sat, 31-Jan-2015
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Knowledge and Learning (IJKL):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email firstname.lastname@example.org