
6 CONCLUSION
We presented an approach that offers a comprehen-
sive framework for anomaly detection in access con-
trol logs using time series analysis and machine learn-
ing. It combines static rules with behavioral pat-
terns to identify unusual activity. Based on identified
anomalies, the proposed system adapt automatically
the Apache Ranger policies, core functionalities like
caching, log storage, ML Model, and initial anomaly
detection using different agents are operational and
show promise.
To ensure our anomaly detection system stays
adaptive and responsive, we plan to implement on-
line learning techniques. This approach will allow
our models to continuously learn and adjust from new
data without the need for retraining, thereby maintain-
ing their accuracy and effectiveness over time. This
strategic focus not only aims to enhance security mea-
sures but also to adapt dynamically to ever-changing
data landscapes, ultimately supporting robust and re-
silient access control policies.
REFERENCES
Alzahrani, B., Cherif, A., Alshehri, S., and Imine, A.
(2024). Securing big graph databases: an overview
of existing access control techniques. International
Journal of Intelligent Information and Database Sys-
tems.
Argento, L., Margheri, A., Paci, F., Sassone, V., and Zan-
none, N. (2018). Towards adaptive access control.
In IFIP Annual Conference on Data and Applications
Security and Privacy, pages 99–109. Springer.
Awaysheh, F. M., Alazab, M., Gupta, M., Pena, T. F., and
Cabaleiro, J. C. (2020). Next-generation big data fed-
eration access control: A reference model. Future
Generation Computer Systems, 108:726–741.
Basin, D., Guarnizo, J., Krstic, S., Nguyen, H., and Ochoa,
M. (2023). Is modeling access control worth it? In
Proceedings of the 2023 ACM SIGSAC Conference
on Computer and Communications Security, pages
2830–2844.
Bl
´
azquez-Garc
´
ıa, A., Conde, A., Mori, U., and Lozano,
J. A. (2021). A review on outlier/anomaly detection
in time series data. ACM Computing Surveys (CSUR),
54(3):1–33.
Das, S., Sural, S., Vaidya, J., and Atluri, V. (2019). Policy
adaptation in hierarchical attribute-based access con-
trol systems. ACM Transactions on Internet Technol-
ogy (TOIT), 19(3):1–24.
Gupta, M., Patwa, F., and Sandhu, R. (2017). Object-tagged
rbac model for the hadoop ecosystem. In IFIP An-
nual Conference on Data and Applications Security
and Privacy, pages 63–81. Springer.
Huang, H., Zhang, J., Hu, J., Fu, Y., and Qin, C. (2022). Re-
search on distributed dynamic trusted access control
based on security subsystem. IEEE Transactions on
Information Forensics and Security, 17:3306–3320.
Jiang, R., Han, S., Yu, Y., and Ding, W. (2023). An access
control model for medical big data based on clustering
and risk. Information Sciences, 621:691–707.
John, T. and Misra, P. (2017). Data lake for enterprises.
Packt Publishing Ltd.
Karimi, L., Abdelhakim, M., and Joshi, J. (2021). Adap-
tive abac policy learning: A reinforcement learning
approach. arXiv preprint arXiv:2105.08587.
Li, G. and Jung, J. J. (2023). Deep learning for anomaly de-
tection in multivariate time series: Approaches, appli-
cations, and challenges. Information Fusion, 91:93–
102.
Premkamal, P. K., Pasupuleti, S. K., Singh, A. K., and
Alphonse, P. (2021). Enhanced attribute based access
control with secure deduplication for big data storage
in cloud. Peer-to-Peer Networking and Applications,
14:102–120.
Qin, Y. and Lou, Y. (2019). Hydrological time series
anomaly pattern detection based on isolation forest.
In 2019 IEEE 3rd information technology, network-
ing, electronic and automation control conference (IT-
NEC), pages 1706–1710. IEEE.
Ren, H., Xu, B., Wang, Y., Yi, C., Huang, C., Kou, X., Xing,
T., Yang, M., Tong, J., and Zhang, Q. (2019). Time-
series anomaly detection service at microsoft. In Pro-
ceedings of the 25th ACM SIGKDD international con-
ference on knowledge discovery & data mining, pages
3009–3017.
Shan, D., Du, X., Wang, W., Wang, N., and Liu, A. (2024).
Kpi-hgnn: Key provenance identification based on a
heterogeneous graph neural network for big data ac-
cess control. Information Sciences, 659:120059.
Walter, M. (2023). Context-based Access Control and At-
tack Modelling and Analysis. PhD thesis, Dissertation,
Karlsruhe, Karlsruher Institut f
¨
ur Technologie (KIT),
2023.
Xu, H., Pang, G., Wang, Y., and Wang, Y. (2023). Deep
isolation forest for anomaly detection. IEEE Transac-
tions on Knowledge and Data Engineering.
SECRYPT 2024 - 21st International Conference on Security and Cryptography
356