Optimized Security Technique for Access Control Rules
Abstract
This work is aimed at optimizing the security technique duly experienced for access control system rules. That will enable the system to grant access only when the set rules for that particular device is obeyed. Thus, by integrating KM principles into Access Control Management and Firewall Optimization, the proposed KMOST (Karnaugh Map Optimization Security Technique) framework provides an enhance security efficacy while simplifying rule management and network segmentation. The KMOST framework streamlines access control management by leveraging KM to identify and eliminate redundant or conflicting rules, thereby enhancing efficiency, and reducing the attack surface. Additionally, by applying KM principles to firewall optimization, the framework aims to minimize rule complexity and improve firewall performance, ensuring optimal protection against cyber threats.
References
Kim, H.; Ko, S., Kim, D.S., Kim, H.K. (2017) Firewall Ruleset Visualization Analysis Tool Based on Segmentation. In Proceedings of the 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), Phoenix, AZ, USA, 2 October 2017; pp. 1–8.
Lee, H.; Lee, S.; Kim, K.; Kim, H.K. (2021). HSViz: Hierarchy Simplified Visualizations for Firewall Policy Analysis. IEEE Access 2021, 9, 71737–71753. [17]
Liang, Y., et al. (2018). "Optimizing Access Controls Using Karnaugh Maps." ACM Transactions on Information and System Security, 21(4), 1-23.
Lu, N.; and Yang, Y. (2020) Application of evolutionary algorithm in performance optimization of embedded network firewall. Microprocess. Microsyst. 2020, 76, 103087.
Liu, J., Zhang, F., Song, X., Song, Y. I., Lin, C.Y. & Hon, H.W., (2013). An Unsupervised Approach to Link Entries across Communities”, Proceedings of International Conference on Web Search Data Mining, pp. 495-504,
Li Y., Peng Y., Ji W., Zhang Z. and Xu Q., (2017). “User Identification based on Display Names across Online Social Networks”, IEEE Access, Vol. 5, pp. 17342 17353,
Li, H., & Zhang, G. (2021). "Anomaly Detection Algorithms for Zero-Day Exploit and APT
Li, W., et al. (2018). "Continuous Monitoring for Real-Time Threat Detection in Enterprise Networks." IEEE Transactions on Dependable and Secure Computing, 15(3), 452-465..
Li Y., Peng Y., Zhang Z., Yin H. and Xu Q., (2018). “Matching User Accounts Across Social Networks based on Username and Display Name”, Proceedings of IEEE International Conference on World Wide Web, pp. 1-23.
Refbacks
- There are currently no refbacks.