Browse > Article
http://dx.doi.org/10.6109/jkiice.2021.25.10.1391

Real-Time File Access Event Collection Methodology for Zero Trust Environment  

Han, Sung-Hwa (Department of Information Security, Tongmyung University)
Lee, Hoo-Ki (Department of Cyber Security, Konyang University)
Abstract
The boundary-based security system has the advantage of high operational efficiency and easy management of security solutions, and is suitable for denying external security threats. However, since it is operated on the premise of a trusted user, it is not suitable to deny security threats that occur from within. A zero trust access control model was proposed to solve this problem of the boundary-based security system. In the zero trust access control model, the security requirements for real-time security event monitoring must be satisfied. In this study, we propose a monitoring method for the most basic file access among real-time monitoring functions. The proposed monitoring method operates at the kernel level and has the advantage of fundamentally preventing monitoring evasion due to the user's file bypass access. However, this study focuses on the monitoring method, so additional research to extend it to the access control function should be continued.
Keywords
Real-time; Security monitoring; Security policy; Zero-trust; Access control;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Sudakshina, D. A. Khan, and S. Jain, "Cloud-Based Zero Trust Access Control Policy: An Approach to Support Work-From-Home Driven by COVID-19 Pandemic," New Generation Computing, pp. 1-24, 2021.
2 A. Kerman, O. Borchert, S. Rose, and A. Tan, "Implementing A Zero Trust Architecture," The MITRE Corporation, Tech. Rep, 2020.
3 M. Al-Asli and T. A. Ghaleb, "Review of signature-based techniques in antivirus products," International Conference on Computer and Information Sciences (ICCIS). IEEE, 2019.
4 L. Abeni and C. Kiraly, "Investigating the network performance of a real-time Linux Kernel," Proc. 15th Real Time Linux Workshop (RTLWS 2013), 2013.
5 G. Anil, "A Zero-Trust Security Framework for Granular Insight on Blind Spot and Comprehensive Device Protection in the Enterprise of Internet of Things (E-IOT)," BMS Institute of Technology, 2021.
6 K. D. Uttecht, "Zero Trust (ZT) Concepts for Federal Government Architectures," Massachusetts inst of tech lexington United States, 2020.
7 C. Wright, C. Cowan, J. Morris, S Smalley, and G. Kroah-Hartman, "Linux security module framework," in Ottawa Linux Symposium, vol. 8032, pp. 6-16, Jun. 2002.
8 A. Rastogi and K. E. Nygard, "Software Engineering Principles and Security Vulnerabilities," in CATA, pp. 180-190, Mar. 2019.
9 H. B. Chang, "A Study on The Countermeasure by The Types through Case Analysis of Industrial Secret Leakage Accident," Convergence security journal, vol. 15 no. 7, pp. 39-45, 2015.
10 R. Riccardo and M. Repetto, "Building situational awareness for network threats in fog/edge computing: Emerging paradigms beyond the security perimeter model," Future Generation Computer Systems, vol. 85, pp. 235-249, 2018.   DOI
11 X. Hao, W. Ren, R. Xiong, T. Zhu, and K. K. R. Choo, "Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things," Future Generation Computer Systems, 2021.
12 J. Kindervag, "Build security into your network's dna: The zero trust network architecture," Forrester Research Inc, pp. 1-26, 2010.