DYNAMIC ACCESS CONTROL MANAGEMENT BASED ON BEHAVIORAL MODELS OF USERS AND SERVICES
DOI:
https://doi.org/10.35546/kntu2078-4481.2025.4.3.30Keywords:
dynamic access control, behavioral models, behavioral analysis, activity anomalies, user profiles, access policy adaptation, risk-based methods, information security, self-adaptive systems, anomaly detectionAbstract
This article proposes an approach to dynamic access rights management based on the analysis of behavioral models of interacting subjects. Particular attention is given to behavioral characteristics that can serve as signals for adapting access policies, methods of their formalization, and algorithmic strategies for real-time decision-making. The study provides an overview of scientific approaches to modeling the behavior of users and services, as well as highlights the limitations of traditional access control systems that rely on statically defined rules or attributes. In particular, issues such as excessive privileges, slow response to contextual changes, and the absence of automated mechanisms for policy evolution in response to real interaction scenarios are analyzed. The paper identifies the urgent scientific problem of developing effective and anomaly-resistant mechanisms for behavior-oriented adaptation of access rights capable of supporting a continuous cycle of monitoring, analysis, and policy adjustment. The structure of behavioral models, methods of their training and interpretation, and principles of integrating such models into access control systems are discussed with consideration of scalability requirements, signal reliability, and risk minimization. Additionally, the article outlines the importance of these approaches for enhancing information system resilience to insider threats, as well as the potential use of behavioral characteristics as a basis for predicting harmful activity and constructing more flexible and self-adaptive access management mechanisms.
References
Hu V. C., Ferraiolo D. F., Kuhn D. R. (2020). Assessment of Access Control Systems. NIST Interagency Report 7316. URL: https://doi.org/10.6028/NIST.IR.7316.
Özkan Canay, Ümit Kocabıçak. (2024). Predictive modeling and anomaly detection in large-scale web portals through the CAWAL framework. URL: https://www.sciencedirect.com/science/article/abs/pii/S0950705124013443.
Fan Yang, Chris L. Hankin, Flemming Nielson, Hanne Riis Nielson. (2013). Predictive access control for distributed computation. URL: https://www.sciencedirect.com/science/article/pii/S0167642312001104.
Yuan Zhai, Haochen Yang, Jingyu Yao, Tao Wang, Yanwei Zhou, Feng Zhu, Bo Yang. (2025). DRAC: A dynamic fine-grained access control scheme for cloud storage with censorship-coerced resistance.URL: https://www.sciencedirect.com/science/article/abs/pii/S2214212625001607.
Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo. (2012).Dynamic risk-based decision methods for access control systems. URL: https://www.sciencedirect.com/science/article/abs/pii/S0167404812000399.







