Netinfo Security ›› 2016, Vol. 16 ›› Issue (10): 34-39.doi: 10.3969/j.issn.1671-1122.2016.10.006

• Orginal Article • Previous Articles     Next Articles

A Network Behavior-based Access Control Model

Chang LIU(), Jingsha HE   

  1. School of Software, Beijing University of Technology, Beijing 100124, China
  • Received:2016-08-01 Online:2016-10-31 Published:2020-05-13

Abstract:

Towards the problem that the separation between identity authentication and behavior authentication in open network environment, we focus on the rules and characteristics of users’ network behavior. Base on the traditional identity authentication, we put forward the action-based access control model. This paper makes clear the definition of users’ network behavior, take user’s glance time and access path as data source, compared the calculated value gotten from the algorithm with threshold, model it with temporal information and environment information, then realize user’s behavior verification. For new users, we check the behavior with Markov Chains; for existing users, we establish the directed tree of frequent access, using the mean-variance algorithm to detect the behavior. This model can adapt to the changes of user’s behavior automatically. Moreover, this framework can avoid the phenomenon like malicious misappropriate of user accounts, which has significant meanings toward network security.

Key words: network behavior, behavior authentication, identity authentication, access control

CLC Number: