Abstract
Digital transformation has led to the fact that almost all organizations and companies are provided with internal private networks and manage sensitive data and applications. In this context, system administrators are superusers who can access all this sensitive material. As it is known that many frauds are caused by internal actions, we argue that it is important to be provided with strong automated logging systems even for superusers. For this purpose, blockchains are an efficient solution as they cannot be overwritten by the system administrators. However, as it is not efficient to store all the actions, we introduce in this paper a novel system based on fuzzy rules in order to efficiently manage the system logging system in a blockchain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Alneyadi, S., Sithirasenan, E., Muthukkumarasamy, V.: A survey on data leakage prevention systems. J. Netw. Comput. Appl. 62(C), 137–152 (2016)
Al Amro, S., Chiclana, F., Elizondo, D.A.: Application of fuzzy logic in computer security and forensics. In: Elizondo, D.A., Solanas, A., MartÃnez-Ballesté, A. (eds.) Computational Intelligence for Privacy and Security, vol. 394. Studies in Computational Intelligence, pp. 35–49. Springer (2012)
Bellman, R.E., Zadeh, L.A.: Decision-making in a fuzzy environment. Manag. Sci. 17(4), B-141–B-164 (1970)
Chen, R.-Y.: A traceability chain algorithm for artificial neural networks using T-S fuzzy cognitive maps in blockchain. Futur. Gener. Comput. Syst. 80, 198–210 (2018)
Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y., Ochoa, M.: Insight into insiders: a survey of insider threat taxonomies, analysis, modeling, and countermeasures. CoRR (2018). arXiv:abs/1805.01612
Kaga, Y., Fujio, M., Naganuma, K., Takahashi, K., Murakami, T., Ohki, T., Nishigaki, M.: A secure and practical signature scheme for blockchain based on biometrics. In: Liu, J.K., Samarati, P. (eds.) Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, 13–15 December, 2017, Proceedings. LNCS, vol. 10701, pp. 877–891. Springer (2017)
Marwala, T., Xing, B.: Blockchain and artificial intelligence. CoRR (2018). arXiv:abs/1802.04451
Spitzner, L.: Honeypots: catching the insider threat. In: Proceedings of the 19th Annual Computer Security Applications Conference, ACSAC 2003, p. 170. IEEE Computer Society, Washington, DC (2003)
Stolfo, S.J., Salem, M.B., Keromytis, A.D.: Fog computing: mitigating insider data theft attacks in the cloud. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy Workshops, SPW 2012, pp. 125–128. IEEE Computer Society, Washington, DC (2012)
Trzeciak, R.F.: SEI cyber minute: insider threats (2017). http://resources.sei.cmu.edu/library/asset-view.cfm?assetid=496626
Xu, H., Tang, R.: Study and improvements for the real-time performance of Linux kernel. In: 2010 3rd International Conference on Biomedical Engineering and Informatics, vol. 7, pp. 2766–2769, October 2010
Zhao, K., Li, Q., Kang, J., Jiang, D., Hu, L.: Design and implementation of secure auditing system in Linux kernel. In: 2007 International Workshop on Anti-Counterfeiting, Security and Identification (ASID), pp. 232–236, April 2007
Acknowledgments
The authors would like to thank Loïc Combis, Kevin Hassan, and Hugo Maitre, students from Polytech Montpellier, for their help for implementing and testing the approach.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Castelltort, A., Chabert, A., Hersog, N., Laurent, A., Sala, M. (2020). Fuzzy Rules Based Solution for System Administration Security Management via a Blockchain. In: Prieto, J., Das, A., Ferretti, S., Pinto, A., Corchado, J. (eds) Blockchain and Applications. BLOCKCHAIN 2019. Advances in Intelligent Systems and Computing, vol 1010 . Springer, Cham. https://doi.org/10.1007/978-3-030-23813-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-23813-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-23812-4
Online ISBN: 978-3-030-23813-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)