Design and methodology for IAM data collection and machine learning model experimentation

Authors

Esther Chinwe Eze
University of North Texas, United States

Synopsis

This chapter talks about the design approach of the project. It also explains how the IAM training dataset used for the project was collected, and the cleaning and processing techniques. 

The methodology involved in the design and implementation of this project involved three (3) major steps- the installation and configuration of an IAM server (WSO2) which aimed to depict an enterprise environment to provide a real-life dataset for training. The second step after the server setup was to collect real-life data from the server in the form of logs and perform data processing on the collected data. The final step was the selection of a suitable supervised Machine learning algorithm and providing an experiment based on it. In the server, 15 users were created by the super admin and each user was assigned roles with different privileges as shown in Figure 5 below. The experiment was based on users performing normal activities for normal logs and brute force attacks for malicious logs.

Published

February 16, 2025

Categories

How to Cite

Eze, E. C. . (2025). Design and methodology for IAM data collection and machine learning model experimentation. In Artificial Intelligence-Assisted Identity and Access Management (pp. 17-29). Deep Science Publishing. https://doi.org/10.70593/978-93-49307-51-3_3