@inbook{5f35ce4b77a64ef0ab62a10f19bec338,
title = "Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study",
abstract = "Understanding how to implement file system access control rules within a system is heavily reliant on expert knowledge, both that intrinsic to how a system can be configured as well as how a current configuration is structured. Maintaining the required level of expertise in fast-changing environments, where frequent configuration changes are implemented, can be challenging. Another set of complexities lies in gaining structural understanding of large volumes of permission information. The accuracy of a new addition within a file system access control is essential, as inadvertently assigning rights that result in a higher than necessary level of access can generate unintended vulnerabilities. To address these issues, a novel mechanism is devised to automatically process a system{\textquoteright}s event history to determine how previous access control configuration actions have been implemented and then utilise the model for suggesting how to implement new access control rules. Throughout this paper, we focus on Microsoft{\textquoteright}s New Technology File System permissions (NTFS) access control through processing operating system generated log data. We demonstrate how the novel technique can be utilised to plan for the administrator when assigning new permissions. The plans are then evaluated in terms of their validity as well as the reduction in required expert knowledge.",
author = "Saad Khan and Simon Parkinson",
year = "2018",
month = sep,
day = "5",
doi = "10.1007/978-3-319-92624-7_7",
language = "English",
isbn = "9783319926230",
series = "Computer Communications and Networks",
publisher = "Springer, Cham",
pages = "159--182",
editor = "Simon Parkinson and Andrew Crampton and Richard Hill",
booktitle = "Guide to Vulnerability Analysis for Computer Networks and Systems",
address = "Switzerland",
}