A Collaborative Approach for Access Control,
Intrusion Detection and Security Testing
M. Blanc
*
J. Briffaut
†
P. Clemente
†
M. Gad El Rab
†
C. Toinard
†
*
Commissariat ` a l’Energie Atomique
†
Laboratoire d’Informatique Fondamentale d’Orl´ eans
BP 12 Batiment IIIA, Rue L´ eonard de Vinci,B.P. 6759
91680 Bruy` eres-le-Chˆ atel 45067 ORLEANS Cedex 2
France France
{jeremy.briffaut,patrice.clemente,mohammed.gadelrab,christian.toinard}@lifo.univ-orleans.fr
mathieu.blanc@cea.fr
ABSTRACT
Security Management is becoming a critical aspect for
large scale distributed systems. In this paper, we propose
a global architecture, based on an original meta-policy ap-
proach for access control and intrusion detection, allowing
to guarantee global security properties. In contrast with
classical meta-policy based systems, by applying verifica-
tion techniques on the meta-policy, our solution guarantees
global security properties while supporting local updates of
the security policy. It is thus a powerful solution that pro-
vides strong fault tolerance since the control is carried out
in a complete decentralized manner. By using a meta-policy,
the system can verify the respect of global security proper-
ties after meta or local modifications of the policy. Thanks
to test components, our system is also able to evaluate and
configure in real-time each of its functionalities while track-
ing self corruption by malicious hackers. Our architecture
is a cooperative multi agent-based system, making it possi-
ble to activate a functionality independently from some oth-
ers. It is divided into several levels, each one contributing
to the automation of the security management.
KEYWORDS: Security, Multi-Agent System, Access
Control, Intrusion Detection, Test, Verification.
1. INTRODUCTION
Keeping distributed system secure is becoming more and
more difficult. Security administrators are required to man-
age several security components scattered everywhere in the
system, with sometimes thousands of hosts, user accounts
and hidden enemies (attackers). Several security mecha-
nisms have been created to guard computer systems from
hackers and malicious users. First, access to system re-
sources (files, applications, peripherals, etc.) was restricted
and no longer accessible to everybody. Access was con-
trolled by security policies according to particular access
control systems (i.e., DAC, MAC, RBAC, etc.).
With an Internet access, computers become massively con-
nected and the risks of bypassing security measures are mul-
tiplied. Therefore, new measures such as firewalls and in-
trusion detection systems (IDS) have been invented. How-
ever, the management of all these mechanisms is not a triv-
ial task because they are usually scattered and may belong
to different administrative domains with sometimes incom-
patible security policies. The main objective of developing
the meta-policy (policy of the policies) is also meant to fa-
cilitate the administration of distributed policies.
To keep the control of large scale networks, many solutions
have been invented to ease the job of the security adminis-
trator(s). For example, security management systems pro-
vide a centralized management console for deploying secu-
rity updates, software patches, virus scans, managing secu-
rity policies, etc. But, to our knowledge, no solution offers
both high level security in distributed system and facilitates
administration.
The multi-agent and multi-level architecture that we pro-
pose goes a step further in the automation of the security
management. In this architecture, we integrate several se-
curity mechanisms (security policy, firewalls, network IDS,
host IDS). Moreover, the proposal includes test and verifica-
tion abilities to guarantee the correctness of the meta-policy
updates proposed by the global administrator.
The novelty of this approach
1
is that it provides an agent-
based security solution that uses different security mech-
anisms that complement each other to overcome the limi-
tations existing in some of these techniques. Agents may
work alone or can form groups of agents, handling specific
functionalities of the overall system, such as security policy,
1
This work was supported by the ACI SATIN http://lifc.univ-
fcomte.fr/∼heampc/SATIN/.
270 0-9785699-0-3/06/$20.00©2006 IEEE