Author(s): Shanmugavelan Ramakrishnan
Identity and access management is the bedrock of cybersecurity. Identity access to digital resources is governed by its techniques, procedures, and rules, which also define the breadth of identity permission over those resources. Some new cyberattack or data breach pops up in the news every week. Many data breaches occur due to inadequate security measures, software flaws, human mistake, malevolent insiders, or the abuse of access and privileges. An improved access control system is possible with the use of AI methods. In order for organisations to better handle authentication and access control in order to reduce cyber risks and other IAM difficulties, studies into artificial intelligence in IAM are necessary. With an eye towards AI’s potential uses in identity and access management - more especially in the areas of privilege monitoring, administration, and control - this research investigates the nature of the connection between AMIS and AI. To better understand how AI works in minimising recognised IAM issues, this study aimed to present evidence from the relevant literature. This study’s results show how AI reinforces identity and access management, which helps with automating procedures, keeping up with technology advances, and reducing the prevalence of cyber threats. One way to accomplish this is by using a binary classification system for security access control, which takes the PDP problem and turns it into a yes/no question. In order to create a distributed, effective, and accurate policy decision point (PDP), a vector decision classifier is also built using the supervised machine learning technique. Kaggle-Amazon access control policy dataset evaluated performance by comparing the proposed mechanism to previous research standards in terms of performance, duration, and flexibility. Given that the PDP is not in direct contact with the PAP, the proposed approach accomplishes a high level of secrecy in relation to access control requirements. In conclusion, PDP-based ML can manage massive access requests, execute many major policies simultaneously, and have a 95% accuracy rate, all without policy conflicts, with a response time of about 0.15 s. The security of access control can be enhanced by making it more responsive, flexible, dynamic, and dispersed
In the extremely interconnected and globalised work environment of today, individuals and organisations engage in continual interaction with one another. Internet connectivity has become an integral aspect of everyday life, as it connects hundreds of millions of systems all over the world. These systems are powered by a wide range of hardware and software technologies, and they are used to deliver communication and commercial services.
In spite of the fact that organisations are growing more productive and efficient, they run the danger of becoming vulnerabilities to data breaches and other forms of cyber attacks. It can be a difficult issue for many organisations to determine which personnel should be provided access to a specific piece of information. If these organisations choose to ignore this information, it could leave their systems open to attack [1].
Access management, which is also known as access control, is the process of verifying, authorising, and holding accountable the identification of an individual in the event that they are permitted access to resources [2].
The access control system is responsible for determining whether or not the appropriate individual is gaining access to the resources when defined access management is carried out. Access control, which includes the four basic processes of identity, authentication, authorization, and accountability, is the cornerstone of computer security.
It is also the foundation of computer security. According to Damon, the procedure comprises being responsible for the enforcement of access control regulations in order to guarantee a timely and efficient response to any requests for accessing corporate resources [3]. It is the primary purpose of access control to enhance the secrecy and security of information technology assets, also known as the enhancement of the resource’s confidentiality.
An effective access control system is critical for preventing unauthorised users from gaining access to the network. Integrated Access Management (IAM) guarantees that end users have a positive user experience that is in line with the suitable security policies. For the purpose of protecting end-users from identity theft and privacy issues, policymakers have enacted a number of legislation that require businesses to install identity and access management (IAM) systems. In addition to these restrictions, the idea of justice is also important.
Frameworks for identity and access management (IAM) are built on three fundamental categories: identity, access, and directoryservices. Research has proven that the numerous vendor technology solutions used to support identity and access management (IAM) demonstrate the significance of IAM [3]. Figure 1 shows the four main types of components that make up identity and access management (IAM): authentication, authorization, user management, and a single repository for users.
In recent years, artificial intelligence (AI) methods have been effectively applied to solve several challenges across various application fields. Healthcare, cybersecurity, business, social media, VR/AR, robots, and countless more areas are just a few of the many modern-day application domains. Figure 2 presents a list of prospective application areas for artificial intelligence in the real world.
According to Sudarsan, an essential component of secure digital systems is the administration of digital identities, as well as authentication and authorization technologies [4]. Access management makes use of identification information to validate the identity of an entity, such as an individual or a device, and then authorises permission to access the resource that has been sought [3]. “True’ digital transformation, which is the safe, adaptive, and flexible information technology infrastructure that every industry and higher education institution strives to attain, is built on Identity Management, which serves as the cornerstone there.
Existing approaches to identity management face considerable challenges in terms of privacy and interoperability as a result of the increasing number of consumer and employee accounts and the requirement to manage them in a secure manner. The fact that users are frequently provided access to resources depending on their position within the organisation is one of the challenges that IAM faces. On the other hand, employees are rarely fit to a particular task they are assigned. According to Naik and Jenkins’s research from 2020, a big security concern for many organisations operating in the digital environment is finding a way to manage employee access to sensitive apps and data [5].
IAM methods that are more intelligent are associated with a lower level of security risk, according to a number of studies. Experts are of the opinion that artificial intelligence has the potential to be a strategically important potential driver of the continuous technological improvement. This is because it can serve as a tool for intelligence augmentation (IA), rather than a substitute for human thought and reasoning processes [6].
Umurerwa and Lesjak report that AI technologies are frequently used by organisations due to the opportunities they present [7]. Reports indicate that despite the growing interest in artificial intelligence (AI), a significant percentage of organisations are still in the period of data collection, and only a small number of organisations have really implemented AI. Additionally, the paper emphasises continuing research into how artificial intelligence (AI) might be incorporated into business models, and it emphasises that organisations may face dangers if they choose to ignore AI.
Additionally, the paper emphasises continuing research into how artificial intelligence (AI) might be incorporated into business models, and it emphasises that organisations may face dangers if they choose to ignore AI. Furthermore, naively accepting artificial intelligence might lead to a variety of issues that are associated with AI [8]. Artificial intelligence technologies can be difficult to comprehend and to comprehend. In order to fully embrace artificial intelligence as a technological innovation, a constant digital transformation will be required. As a consequence of this, the effectiveness of the influencing elements can be improved by boosting digital organisational preparedness through research (such as this thesis) and by remaining current with technology advancements.
Building models through the use of algorithms is the focus of machine learning, a subfield of artificial intelligence that combines computer science and mathematics. Models of machine learning are able to generate predictions or decisions that are equivalent to those made by the human brain when they are trained using data. Additionally, the accuracy of the output will rise in proportion to the number of learnings that are performed [9].
Artificial intelligence (AI) encompasses a wide range of disciplines, some of which include robotics, computer vision, expert systems, genetic algorithms, reinforcement learning, neural networks, fuzzy logic, planning and scheduling, and machine learning (ML). Machine learning is the most widely used subfield of cybersecurity, according to Versola [10].
Supervised, unsupervised, semi supervised, and reinforcement learning are only a few of the many varieties of machine learning. Instead of being explicitly coded, these machine learning types use statistical approaches to let computers “learn’ from data. When aimed at a particular task rather than a general objective, it is capable of producing the best results. In the case of machine learning, for instance, its applications include the detection of intrusions or viruses, as well as the identification of users based on biometrics [11].
Mathematical methods that enable the integration of sensory chains, grouping, intensification, reasoning coding, and decision studying make up machine learning. Classification algorithms, which seek out harmful code and software, anomaly detection algorithms, which look for unusual or harmful traffic, and correlation algorithms, which connect signals from various systems, are all part of its utility [12].
Over the course of time, the system continues to develop in terms of its speed and efficiency in identifying and responding to unforeseen risks [13]. According to the Ellen MacArthur Foundation, artificial intelligence has the ability to handle complexities and improve understanding of huge quantities of information. It may also be considered as a supplement to human capabilities that promotes more efficient learning from feedback.
A number of fields in science and technology have made use of AI-based methods because of their capacity to examine massive amounts of data. Their applications have been found in numerous security-related sectors, including encryption, trust, attack detection, privacy, and Zhang, Guo, Bosri [14-16].
The researchers set out to explore how AI and ML are changing the face of industry-specific identity and access management systems and built-in AI solutions for these systems. In this study, a qualitative research method and a research design that was simplified from a meta-analysis approach were utilised in order to present a concise and detailed overview of findings from qualitative studies that were conducted in the same research area, to develop an in-depth analysis, to gather comprehensive data through a variety of data collection methods, and to answer the research questions that were posed for this study
During the course of the literature review, the researcher concentrated on works that had been subjected to peer review and that set forth the components of how artificial intelligence and machine learning revolutionise identity and access management systems. It was decided to establish a fundamental topic description, which had headings that described the major discoveries that were made. In the analysis of the data, the concepts that surfaced as a result of the study questions are taken into consideration, along with the ways in which those concepts are connected to the research and theoretical frameworks. A descriptive interpretative technique to analysis is utilised in a qualitative meta-analysis, and the following steps are included in this approach:
Also, to make sure it’s legit, the study uses loads of safety features including reliability tests (such external validation and crossvalidation). This aspect of qualitative analysis furnishes in-depth details regarding contextual circumstances or sheds light on the causes of events that are usually overlooked by quantitative research. Results are utilised to understand the pros and cons of the research participants’ (here, AI-based solution-using companies) AI feature integration into their IAM system.
In this section, we outline the proposed policy decision point (PDP) for ML-based access control and compare it to previous approaches. We also highlight the differences between the two. More dynamic, distributed, effective, and accurate access decisions are also going to be the focus of this investigation. In addition, we will address the question.
The following part will go over the function of the policy decision point (PDP) in conventional access control. Furthermore, we will detail the ways in which our study aims to address the shortcomings of traditional methods by enhancing their adaptability, dynamism, and safety. Decisions on access at policy decision points (PDP) typically include performing logical operations on the request until it is confirmed to comply with the given control policies, as shown in Figure 5. Below is an explanation of the technique.
The proposed framework is an adaptive mapping strategy that includes multiple permission determination architectures to improve the performance of access control decision-making in a BYOD environment. Here are the main aspects that outline the basis of the proposed model.
Utilising the following performance evaluation criteria, we established the extent to which the suggested solution would ameliorate the policy decision point. First, the confusion matrix in Table 1 was built using the decision-making findings. The defined number of samples that were correctly refused access (DAR), the quantity of samples that were incorrectly given access (DRA), and the number of samples that were correctly rejected access (DRR) make up the total number of samples that were accessible.
Figures 7 and 8 display the experimental results, which show that the ROC curve stays the same regardless of how the sample group is distributed. This meant that the algorithms’ ROC performance was low before using the data balancing technique.
As shown in Figure 9, the two algorithms with the lowest performance are logistic regression (LR) and support vector machines (SVM). Results show that RF, decision trees, and k-nearest neighbours (KNN) are all very similar.
A key component of access control security is the ability to respond quickly to requests for access and to update the system’s access control policy dynamically; this keeps the system from becoming a bottleneck, which is why time is so important. So, as shown in Figure 10, we looked at how long it took to train the model and how long it took for a policy decision point (PDP) to update its decision on whether to enable or disable access. When compared to the other methods, SVM training took the longest, while LR, KNN, and DT all took around the same.
In addition, as shown in Figure 11, data balancing approaches were used to analyse the testing time outcomes of different methodologies, with an emphasis on security access decisionmaking. A number of methodologies were taken into account for the analysis, including RF, KNN, DT, LR, and SVM (support vector machine). The goal of the study was to compare the approaches’ efficiency by looking at how long it took to test them following data balancing.
Experiment results showing the flexibility of ML-based PDP with respect to policy size over time are shown in Figure 12. A measure of adaptability was the number of seconds it took for access control to react to complicated policies. It was decided to send out random requests with policy sizes ranging from 1000 to 6000 for the experiment. At a policy scale of 6000, the time cost was around 0.15 s. The model seemed to have a favourable reaction to the policy’s magnitude.
Access control decision-making methods were examined and assessed in this study. At the usual policy decision point for access control, predefined rules are employed to make access decisions. Consequently, there are a number of issues with decision-making and access control, such as competing policies, insufficient entities, subpar PDP performance, response times to access requests, and financial concerns. However, the proposed method enhanced the access control policy decision point (PDP) based on machine learning by translating PDP concerns into a straightforward yes/ no request classification. To begin, there was a balanced dataset. Attributes and characteristics have their dimensions subsequently shrunk. As part of the enhanced PDP-based ML method, two models were developed: one for testing training models and another for decision-making.
To improve upon the current access control, the proposed solution proposed a lightweight, distributed, and dynamic policy decision point (PDP) in place of an access decision based on predetermined rules. In spite of the scenario’s complexity, the amount of entities, and the number of concurrent big requests, it handled them all with ease. The policies were also made more secretive and private without requiring direct contact or connection to the PAP policy, which provided security and privacy for access control.