HAL Id: hal-01332040
https://hal.inria.fr/hal-01332040
Submitted on 15 Jun 2016
HAL is a multi-disciplinary open access
archive for the deposit and dissemination of sci-entific research documents, whether they are pub-lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.
L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
Distributed under a Creative Commons Attribution - NonCommercial - NoDerivatives| 4.0 International License
Monitoring accountability policies with AccMon framework
Walid Benghabrit, Hervé Grall, Jean-Claude Royer
To cite this version:
Walid Benghabrit, Hervé Grall, Jean-Claude Royer. Monitoring accountability policies with AccMon framework. GDR-GPL, Jun 2016, Besançon, France. �hal-01332040�
SPECIALITY Computer Science
LABORATORY Inria, LINA
TEAM ASCOLA Research Group
LOCATION Mines Nantes - France
<first name>.<last name>@mines-nantes.fr
Director: Pr. Jean-Claude Royer
Supervisor: A/Prof. HervE Grall
IDENTITY
PhD Stu
dent
Walid Benghabrit
Monitoring
accountability
policies with
AccMon framework
∀ x:Human. watch(x)
https://github.com/hkff/AccLab https://github.com/hkff/fodtlmonTake the control of your data
and care about your privacy,
it's already too late...
LOADING...
https://github.com/hkff/AccMon
- Inter
connec
ted syst
ems with
many
differ
ent techn
ologies which implies
many s
ecurity br
eaches
.
- Your per
sonal infor
mation ar
e already
on th
e cloud!
How to ensure that the privacy policy is respected? Distribution makes systems harder to monitor
There is NO perfect security
(1) We define what, when and how we log.
(2) We write the property to monitor in FODTL3*.
(3) We watch the running system.
(4) We audit the system when violations occurs. (5) We decide if the violation is legit or not and we trigger the remediation monitor if any.
OS <---- Sync vec tor ----> --- ---| AccMon | --- --- ---| Applications | --- --- ---| Services | --- --- ---| Hardwar e | --- --- --- ---| | | | | | | | | | | | | | --- --- --- ---| Web App ---| --- --- ---| Database | --- ---<-> | | <--- ---> | | |--> | | |--> --- ----| Machine | --- --- ----| Machine | ---
--- Accoun
tability
:
Beyond
security to pr
eserve pr
ivacy
- Monitorin
g:
Flexible and e
xtensible fra
mework
- Distribut
ed temporal logic:
Formal veri
fication over
distributed
system
* Three-valued F irst Or der Distribu ted Linear T emporal L ogic ---| Controls ---| ---| Logging ---| ---| Plugins ---| ---| Monitors ---| ---Violations Audits | | | <---> <---> ψ ::= true | false | ¬ψ | ψ ∨ ψ | ψ ∧ ψ | φ (propositional) | ∃x.ψ | ∀x.ψ (first or der) | X ψ | ψ U ψ | ψ R ψ | G ψ | F ψ (temporal) | @ p ψ (distribut ion) φ ::= P t ∗ (predicates) Monitoring t echnic: P rogression (F ormula r ewriting) eval(ψ) = T rue | False | Un known root@root:~$ man AccMon - Centralized / Distributed monitoring - Posteriori / Realtime cont rol- Extensible framewor
k
Manual page A
ccMon (END)
(press h for help o
r q to quit)
Classical security controls Extensible logging module
Interconnection with external components Monitor with its violations and audits reports
AccMon internal architecture
- Automat
ed audit/
remediation
(Deeplear
ning.
Ethical problem? Comput
ers ta
cking human
decisions. ..)
- Usability
(Improve logical for
mula wr iting to n on specialists ) - Monitorin g: protect pr
ivacy by violating you
r privac y?
(Nothing
is good or bad, it'
s all about
how you u
se it...)