Mitigating Privilege Misuse in Access Control through Anomaly Detection.
Gelareh Hasel MehriInez L. WesterFederica PaciNicola ZannonePublished in: ARES (2023)
Keyphrases
- anomaly detection
- access control
- security policies
- access control policies
- intrusion detection system
- intrusion detection
- detecting anomalies
- data security
- dynamic access control
- role based access control
- network security
- anomalous behavior
- access control models
- network traffic
- unsupervised learning
- access control systems
- misuse detection
- network intrusion detection
- security requirements
- security model
- one class support vector machines
- security mechanisms
- security architecture
- access control mechanism
- machine learning
- detect anomalies
- distributed environment
- computer networks
- conflict resolution
- negative selection algorithm