Lecture 13
Lecture 13
Access Control
13-2
Outline
0 Access Control Overview
0 Identification, Authentication, Authorization, Accountability
0 Single Sign-on and Kerberos
0 Access Control Models
0 Access Control Techniques and Technologies
0 Access Control Administration
0 Access Control Monitoring: Intrusion Detection
0 Threats to Access Control
12/17/23 11:08
13-3
Access Control
0 Access control is a system which enables an authority to control
access to areas and resources in a given physical facility or
computer-based information system.
0 In computer security, access control includes authentication,
authorization and audit. It also includes measures such as physical
devices, including biometric scans and metal locks, hidden paths,
digital signatures, encryption, social barriers, and monitoring by
humans and automated systems.
0 In any access control model, the entities that can perform actions in
the system are called subjects, and the entities representing
resources to which access may need to be controlled are called
objects (see also Access Control Matrix). Subjects and objects
should both be considered as software entities and as human users
12/17/23 11:08
13-4
Access Control
0 Access control models used by current systems tend to fall into one
of two classes: those based on capabilities and those based on
access control lists (ACLs).
0 In a capability-based model, holding an unforgeable reference or
capability to an object provides access to the object
0 Access is conveyed to another party by transmitting such a
capability over a secure channel.
0 In an ACL-based model, a subject's access to an object depends on
whether its identity is on a list associated with the object
12/17/23 11:08
13-5
13-6
13-7
13-8
13-9
13-10
Single Sign-On
0 Single sign-on (SSO) is a property of access control of multiple,
related, but independent software systems. With this property a user
logs in once and gains access to all systems without being
prompted to log in again at each of them. Single sign-off is the
reverse property whereby a single action of signing out terminates
access to multiple software systems.
0 As different applications and resources support different
authentication mechanisms, single sign-on has to internally
translate to and store different credentials compared to what is used
for initial authentication.
12/17/23 11:08
13-11
13-12
Kerberos
0 Kerberos uses as its basis the symmetric Needham-Schroeder
protocol. It makes use of a trusted third party, termed a key
distribution center (KDC), which consists of two logically separate
parts: an Authentication Server (AS) and a Ticket Granting Server
(TGS). Kerberos works on the basis of "tickets" which serve to prove
the identity of users.
0 The KDC maintains a database of secret keys; each entity on the
network — whether a client or a server — shares a secret key known
only to itself and to the KDC. Knowledge of this key serves to prove
an entity's identity. For communication between two entities, the
KDC generates a session key which they can use to secure their
interactions.
0 The security of the protocol relies heavily on participants
maintaining loosely synchronized time and on short-lived assertions
of authenticity called Kerberos tickets.
12/17/23 11:08
13-13
Kerberos
0 The client authenticates itself to the Authentication Server and
receives a ticket. (All tickets are time-stamped.)
0 It then contacts the Ticket Granting Server, and using the ticket it
demonstrates its identity and asks for a service.
0 If the client is eligible for the service, then the Ticket Granting
Server sends another ticket to the client.
0 The client then contacts the Service Server, and using this ticket it
proves that it has been approved to receive the service.
12/17/23 11:08
13-14
Kerberos: Drawbacks
0 Single point of failure: It requires continuous availability of a central server.
When the Kerberos server is down, no one can log in. This can be mitigated
by using multiple Kerberos servers and fallback authentication mechanisms.
0 Kerberos requires the clocks of the involved hosts to be synchronized. The
tickets have a time availability period and if the host clock is not
synchronized with the Kerberos server clock, the authentication will fail. The
default configuration requires that clock times are no more than five minutes
apart. In practice Network Time Protocol daemons are usually used to keep
the host clocks synchronized.
0 The administration protocol is not standardized and differs between server
implementations.
0 Since all authentication is controlled by a centralized KDC, compromise of
this authentication infrastructure will allow an attacker to impersonate any
user.
12/17/23 11:08
13-15
13-16
Access Control
0 Access control techniques: Access control techniques are sometimes
categorized as either discretionary or non-discretionary. The three most
widely recognized models are Discretionary Access Control (DAC),
Mandatory Access Control (MAC), and Role Based Access Control (RBAC).
MAC and RBAC are both non-discretionary.
0 Attribute-based Access Control: In attribute-based access control, access is
granted not based on the rights of the subject associated with a user after
authentication, but based on attributes of the user. The user has to prove so
called claims about his attributes to the access control engine. An attribute-
based access control policy specifies which claims need to satisfied in order
to grant access to an object. For instance the claim could be "older than 18" .
Any user that can prove this claim is granted access. Users can be
anonymous as authentication and identification are not strictly required. One
does however require means for proving claims anonymously. This can for
instance be achieved using Anonymous credentials.
12/17/23 11:08
13-17
Access Control
0 Discretionary access control: (DAC) is an access policy determined
by the owner of an object. The owner decides who is allowed to
access the object and what privileges they have.
0 Two important concepts in DAC are
0 File and data ownership: Every object in the system has an owner. In
most DAC systems, each object's initial owner is the subject that
caused it to be created. The access policy for an object is
determined by its owner.
0 Access rights and permissions: These are the controls that an owner
can assign to other subjects for specific resources.
0 Access controls may be discretionary in ACL-based or capability-
based access control systems. (In capability-based systems, there is
usually no explicit concept of 'owner', but the creator of an object
has a similar degree of control over its access policy.)
12/17/23 11:08
13-18
Access Control
0 Mandatory access control: (MAC) is an access policy determined by the
system, not the owner. MAC is used in multilevel systems that process highly
sensitive data, such as classified government and military information. A
multilevel system is a single computer system that handles multiple
classification levels between subjects and objects.
0 Sensitivity labels: In a MAC-based system, all subjects and objects must have
labels assigned to them. A subject's sensitivity label specifies its level of
trust. An object's sensitivity label specifies the level of trust required for
access. In order to access a given object, the subject must have a sensitivity
level equal to or higher than the requested object.
0 Data import and export: Controlling the import of information from other
systems and export to other systems (including printers) is a critical function
of MAC-based systems, which must ensure that sensitivity labels are properly
maintained and implemented so that sensitive information is appropriately
protected at all times.
12/17/23 11:08
13-19
Access Control
0 Two methods are commonly used for applying mandatory access
control:
0 Rule-based (or label-based) access control: This type of control
further defines specific conditions for access to a requested object.
All MAC-based systems implement a simple form of rule-based
access control to determine whether access should be granted or
denied by matching:
- An object's sensitivity label
- A subject's sensitivity label
0 Lattice-based access control: These can be used for complex access
control decisions involving multiple objects and/or subjects. A
lattice model is a mathematical structure that defines greatest lower-
bound and least upper-bound values for a pair of elements, such as
a subject and an object.
12/17/23 11:08
13-20
Access Control
0 Role-based access control: (RBAC) is an access policy determined
by the system, not the owner. RBAC is used in commercial
applications and also in military systems, where multi-level security
requirements may also exist. RBAC differs from DAC in that DAC
allows users to control access to their resources, while in RBAC,
access is controlled at the system level, outside of the user's
control.
0 Although RBAC is non-discretionary, it can be distinguished from
MAC primarily in the way permissions are handled. MAC controls
read and write permissions based on a user's clearance level and
additional labels. RBAC controls collections of permissions that may
include complex operations such as an e-commerce transaction, or
may be as simple as read or write. A role in RBAC can be viewed as
a set of permissions.
12/17/23 11:08
13-21
Access Control
0 Three primary rules are defined for RBAC:
0 1. Role assignment: A subject can execute a transaction only if the
subject has selected or been assigned a role.
0 2. Role authorization: A subject's active role must be authorized for
the subject. With rule 1 above, this rule ensures that users can take
on only roles for which they are authorized.
0 3. Transaction authorization: A subject can execute a transaction
only if the transaction is authorized for the subject's active role. With
rules 1 and 2, this rule ensures that users can execute only
transactions for which they are authorized.
0 Additional constraints may be applied as well, and roles can be
combined in a hierarchy where higher-level roles subsume
permissions owned by sub-roles.
0 Most IT vendors offer RBAC in one or more products.
12/17/23 11:08
13-22
What is Biometrics?
0 Biometrics are automated methods of recognizing a person based
on a physiological or behavioral characteristic
0 Features measured: Face, Fingerprints, Hand geometry, handwriting,
Iris, Retinal, Vein and Voice
0 Identification and personal certification solutions for highly secure
applications
0 Numerous applications: medical, financial, child care, computer
access etc.
0 Biometrics replaces Traditional Authentication Methods
0 Provides better security
0 More convenient
0 Better accountability
0 Applications on Fraud detection and Fraud deterrence
0 Dual purpose: Cyber Security and National Security
12/17/23 11:08
13-23
13-24
Why Biometrics?
0 Authentication mechanisms often used are User ID and Passwords
0 However password mechanisms have vulnerabilities: Stealing
passwords
0 Biometrics systems are less prone to attacks
0 Need sophisticated techniques for attacks
- Cannot steal facial features and fingerprints
- Need sophisticated image processing techniques for modifying
facial features
0 Biometrics systems are more convenient, Need not have multiple
passwords or difficult passwords
- E.g., characters, numbers and special symbols, Need not
remember passwords
0 Need not carry any cards or tokens
0 Better accountability: Can determine who accessed the system with
less complexity
12/17/23 11:08
13-25
13-26
Security Vulnerabilities
0 Type 1 attack: present fake biometric such a synthetic
biometric
0 Type 2 attack: Submit a previously intercepted biometric
data: replay
0 Type 3 attack: Compromising the feature extractor module to
give results desired by attacker
0 Type 4 attack: Replace the genuine feature values produced
by the system by fake values desired by attacker
0 Type 5 attack: Produce a high number of matching results
0 Type 6 attack: Attack the template database: add templates,
modify templates etc.
12/17/23 11:08
13-27
13-28
Biometric Process
0 User enrolls in a system and provides biometric data
0 Data is converted into a template
0 Later on user provides biometric data for verification or
identification
0 The latter biometric data is converted into a template
0 The verification/identification template is compared with the
enrollment template
0 The result of the match is specified as a confidence level
0 The confidence level is compared to the threshold level
0 If the confidence score exceeds the threshold, then there is a
match
0 If not, there is no match
12/17/23 11:08
13-29
13-30
Data Types and Associated Biometric
Technologies
0 Finger scan: Fingerprint Image
0 Voice scan: Voice recording
0 Face scan: Facial image
0 Iris scan: Iris image
0 Retina scan: Retina image
0 Hand scan: Image of hand
0 Signature scan: Image of signature
0 Keystroke scan: Recording of character types
12/17/23 11:08
13-31
Templates
0 Templates are NOT compressions of biometric data; they are
constructed from distinctive features extracted
0 Cannot reconstruct the biometric data from templates
0 Same biometric data supplied by a user at different times may
results in different templates
0 When the biometric algorithm is applied to these templates, it
will recognize them as the same biometric data
0 Templates may consist of strings of characters and numeric
values
0 Vendor systems are heterogeneous; standards are used for
common templates and for interoperability
12/17/23 11:08
13-32
Biometric Matching
0 Part of the Biometric process: Compares the user provided
template with the enrolled templates
0 Scoring:
- Each vendor may use a different score for matching; 1-10
or -1 to 1
- Scores also generated during enrollment depending on
the quality of the biometric data
- User may have to provide different data if enrollment
score is low
0 Threshold is generated by system administrator and varies
from system to system and application to application
0 Decision depending on match/ nomatch
- 100% accuracy is generally not possible
12/17/23 11:08
13-33
13-34
13-35
13-36
13-37
13-38