Claims
- 1. A method of providing enhanced monitoring and enforcement of usage policy and security for a data processing system network, said method comprising:
monitoring events occurring on said system; storing data identifying said events as system event data; analyzing said system event data via a software classifier that includes a set of initial policy constraints; and when said software classifier indicates that a particular system event data does not comply with said initial policy constraints, initiating a process that:
enables a system administrator to modify and update said initial policy constraints to account for said particular system event data and generate refined policy constraints; and responsive to said modifying of said initial policy constraints, implements an updated software classifier that monitors and enforces said usage policy and security of said network via said refined policy constraints.
- 2. The method of claim 1, wherein creation of said initial policy constraints and said refined policy constraints includes implementing a dynamic, software-based data mining operation to generate said software classifier with said initial and refined policy constraints.
- 3. The method of claim 2, wherein said initial policy constraints and said refined policy constraints are provided in human readable form.
- 4. The method of claim 1, wherein said analyzing step includes the steps of:
retrieving said system event data from a network session storing said system event data within a database, wherein said database is a text file of events of interest within the system; and forwarding system event data from within said database to said software classifier at a pre-established interval.
- 5. The method of claim 1 wherein said analyzing step comprises:
extracting system event data from said database by pairing each line of said database for identifying information of events that are known and labeled within the policy document; dividing extracted system event data into a database of known events and a database of unknown events; and labeling each system data with a label selected from among a first label that indicates when said system data complies with said initial policy constraints and a second label that indicates that said system data does not comply with said initial policy constraints.
- 6. The method of claim 5, further comprising:
converting known events into event window examples that may be inputted into the classifier; and applying each of a plurality of functions in a function library to said events.
- 7. The method of claim 6, further comprising:
repeating said applying step for a predetermined number of events to capture a window of events as a window example; and shifting said window down one event at a time until a final event within said database falls within said window.
- 8. The method of claim 7, further comprising:
applying current policy rules base to determine a labeling for each event window example; labeling an event window selected by a user for override of an initial labeling to produce a set of re-labeled event example windows; and applying theory refinement to the set of re-labeled event example windows to generate a new policy document that is consistent with the re-labeled event example windows.
- 9. The method of claim 6, wherein said labeling step includes:
enabling said system administrator to re-label select ones of said event window examples; and providing the re-labeled event window example to a theory refinement algorithm designed to determine which policy should be modified to correct classification of events according to the re-labeling of the select event window example.
- 10. The method of claim 9, further comprising:
generating a updated policy document; and outputting said modified policy document to a system administrator for inspection, wherein said system administrator is able to modify said policy document and produce a new classifier; and implementing monitoring and security operation utilizing said refined policy document with the modifications of said system administrator.
- 11. The method of claim 9, further comprising:
enabling system administrator validation of modification provided by said theory refinement process, whereby modification of a data extractor and a rule base of said classifier is completed.
- 12. A computer program product comprising:
a computer readable medium; and program code on said computer readable medium that provides enhanced monitoring and enforcement of usage policy and security for a data processing system network, wherein said program code includes code for: monitoring events occurring on said system; storing data identifying said events as system event data; analyzing said system event data via a software classifier that includes a set of initial policy constraints; and when said software classifier indicates that a particular system event data does not comply with said initial policy constraints, initiating a process that:
enables a system administrator to modify and update said initial policy constraints to account for said particular system event data and generate refined policy constraints; and responsive to said modifying of said initial policy constraints, implements an updated software classifier that monitors and enforces said usage policy and security of said network via said refined policy constraints.
- 13. The computer program product of claim 12, wherein the program codes that creates said initial policy constraints and said refined policy constraints includes code for implementing a dynamic, software-based data mining operation to generate said software classifier with said initial and refined policy constraints.
- 14. The computer program product of claim 13, wherein said initial policy constraints and said refined policy constraints are provided in human readable form.
- 15. The computer program product of claim 12, wherein said program code for analyzing includes program code for:
retrieving said system event data from a network session storing said system event data within a database, wherein said database is a text file of events of interest within the system; and forwarding system event data from within said database to said software classifier at a pre-established interval.
- 16. The computer program product of claim 15 wherein said program code for analyzing comprises:
extracting system event data from said database by pairing each line of said database for identifying information of events that are known and labeled within the policy document; dividing extracted system event data into a database of known events and a database of unknown events; and labeling each system data with a label selected from among a first label that indicates when said system data complies with said initial policy constraints and a second label that indicates that said system data does not comply with said initial policy constraints.
- 17. The computer program product of claim 16, further comprising program code for:
converting known events into event window examples that may be inputted into the classifier; and applying each of a plurality of functions in a function library to said events.
- 18. The computer program product of claim 17, further comprising program code for:
repeating said applying step for a predetermined number of events to capture a window of events as a window example; and shifting said window down one event at a time until a final event within said database falls within said window.
- 19. The computer program product of claim 18, further comprising program code for:
applying current policy rules base to determine a labeling for each event window example; labeling an event window selected by a user for override of an initial labeling to produce a set of re-labeled event example windows; and applying theory refinement to the set of re-labeled event example windows to generate a new policy document that is consistent with the re-labeled event example windows.
- 20. The computer program product of claim 17, wherein said program code for labeling includes program code for:
enabling said system administrator to re-label select ones of said event window examples; and providing the re-labeled event window example to a theory refinement algorithm designed to determine which policy should be modified to correct classification of events according to the re-labeling of the select event window example.
- 21. The computer program product of claim 20, further comprising program code for:
generating a updated policy document; and outputting said modified policy document to a system administrator for inspection, wherein said system administrator is able to modify said policy document and produce a new classifier; and implementing monitoring and security operation utilizing said refined policy document with the modifications of said system administrator.
- 22. The computer program product of claim 20, further comprising program code for:
enabling system administrator validation of modification provided by said theory refinement process, whereby modification of a data extractor and a rule base of said classifier is completed.
- 23. A semi-automated method for developing and maintaining a system security policy, comprising:
generating an initial security policy corresponding to system events and functioning as an initial symbolic classifier, said security policy corresponding to system events and functioning as an initial symbolic classifier, said security policy including policy constraints; comparing the network system data against the classifier; labeling the data in response to the comparison to indicate whether the data violated one of said policy constraints; re-labeling the data to generate re-labeled data; generating a new security policy in response to the transmitting to generate a new symbolic classifier; modifying the symbolic classifier; and substituting the modified new symbolic classifier for the initial symbolic classifier.
- 24. A system that provides enhanced monitoring and enforcement of usage policy and security for a data processing system network, said system comprising:
means for monitoring events occurring on said system; means for storing data identifying said events as system event data; means for analyzing said system event data via a software classifier that includes a set of initial policy constraints; and means, when said software classifier indicates that a particular system event data does not comply with said initial policy constraints, for initiating a process that:
enables a system administrator to modify and update said initial policy constraints to account for said particular system event data and generate refined policy constraints; and responsive to said modifying of said initial policy constraints, implements an updated software classifier that monitors and enforces said usage policy and security of said network via said refined policy constraints.
- 25. The system of claim 24, wherein:
said means for monitoring includes an initial policy document that comprises said initial policy constraints: and said means for initiating includes means for implementing a dynamic, software-based data mining operation to generate said software classifier with said initial and refined policy constraints.
- 26. The system of claim 25, wherein said initial policy constraints and said refined policy constraints are provided in human readable form.
- 27. The system of claim 24, wherein said means for analyzing includes:
means for retrieving said system event data from a network session storing said system event data within a database, wherein said database is a text file of events of interest within the system; and means for forwarding system event data from within said database to said software classifier at a pre-established interval.
- 28. The system of claim 24 wherein said means for analyzing comprises:
means for extracting system event data from said database by pairing each line of said database for identifying information of events that are known and labeled within the policy document; means for dividing extracted system event data into a database of known events and a database of unknown events; and means for labeling each system data with a label selected from among a first label that indicates when said system data complies with said initial policy constraints and a second label that indicates that said system data does not comply with said initial policy constraints.
- 29. The system of claim 28, further comprising:
means for converting known events into event window examples that may be inputted into the classifier; and means for applying each of a plurality of functions in a function library to said events.
- 30. The system of claim 29, further comprising:
means for repeating said applying step for a predetermined number of events to capture a window of events as a window example; and means for shifting said window down one event at a time until a final event within said database falls within said window.
- 31. The system of claim 30, further comprising:
means for applying current policy rules base to determine a labeling for each event window example; means for labeling an event window selected by a user for override of an initial labeling to produce a set of re-labeled event example windows; and means for applying theory refinement to the set of re-labeled event example windows to generate a new policy document that is consistent with the re-labeled event example windows.
- 32. The system of claim 29, wherein said means for labeling includes:
means for enabling said system administrator to re-label select ones of said event window examples; and means for providing the re-labeled event window example to a theory refinement algorithm designed to determine which policy should be modified to correct classification of events according to the re-labeling of the select event window example.
- 33. The system of claim 32, further comprising:
means for generating a updated policy document; and means for outputting said modified policy document to a system administrator for inspection, wherein said system administrator is able to modify said policy document and produce a new classifier; and means for implementing monitoring and security operation utilizing said refined policy document with the modifications of said system administrator.
- 34. The system of claim 32, further comprising:
means for enabling system administrator validation of modification provided by said theory refinement process, whereby modification of a data extractor and a rule base of said classifier is completed.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] The present application shares specification text and figures with the following co-pending application, which was filed concurrently with the present application: application Ser. No. ______ (Attorney Docket Number AUS920020543US1) titled “Suggesting data interpretations and patterns for updating policy documents,” the entire contents of which are incorporated herein by reference.