期刊文献+

一种增强的Linux系统安全审计机制

An Enhanced Security Auditing Mechanism for Linux
下载PDF
导出
摘要 提出了一个增强Linux系统安全审计功能的机制。该机制以可装载内核模块技术为基础,提供系统层和应用层两个层次的审计功能。系统审计为每个安全相关的系统调用生成审计记录。应用层审计改变了传统的完全依赖于应用程序在用户空间写日志文件的方式,由应用程序和内核共同产生审计记录。最后给出用该审计机制进行入侵检测的例子。 An enhanced security auditing mechanism for Linux is proposed.This mechanism is based on loadable kernel mo-(dule) and provides system level and application level auditing functions.System audit generates an audit record for every security sensitive system call.Application level audit abandons the traditional auditing fashion that auditing system completely depends on applications writing log file in user space.Instead,applications and system kernel will generate audit record coordinately.Examples are given for intrusion detection with this mechanism.
作者 徐辉 潘爱民
出处 《计算机应用研究》 CSCD 北大核心 2004年第11期150-153,共4页 Application Research of Computers
关键词 审计 系统审计 应用层审计 审计记录 可装载内核模块 入侵检测 Audit System Audit Application Level Audit Audit Record Loadable Kernel Module Intrusion Detection
  • 相关文献

参考文献9

  • 1Trusted Computer System Evaluation Criteria[R].DoD 5200,28STD,U.S.Department of Defense,1985.
  • 2The Intersect Alliance,SNARE (System Intrusion Analysis And Reporting Environment)Project[EB/OL].http://www.intersectalliance.com,2001.
  • 3Darren J Moffat.Focus on Sun: Solaris BSM Auditing[EB/OL].http://www.securityfocus.com/cgi- bin/infocus.pl?id=1362,2000.
  • 4Kevin Wenchel,Stephen Michaels.Implementing C2 Auditing in Solaris Environment[EB/OL].http://www.samag.com/documents/s=1157/sam0013d,2000.
  • 5The Linux BSM Project[EB/OL].http://linuxbsm.sourceforge.net,2001.
  • 6Alessandro Rubini,Jonathan Corbet.Linux Divice Drivers[Z].O'Reilly & Associates,Inc,2001.
  • 7Ori Pomerantz.The Linux Kernel Module Programming Guide[M].Treeless Press Publishing,2000.
  • 8W Richard Stevens.UNIX Network Programming Volum2 Interprocess Communications[M].Prentice Hall PTR,1999.
  • 9汪立东,方滨兴.Linux Shell安全审计机制的扩展[J].软件学报,2002,13(1):80-84. 被引量:14

二级参考文献4

  • 1Durst, R., Champion, T., Witten, B., et al. Testing and evaluating computer intrusion detection systems. Communications of the ACM, 1999,42(7):53~61.
  • 2Halflife. Linux TTY hijacking. Phrack Magazine, 1997,7(50):5~5.
  • 3Plaguez. Weakening the Linux kernel. Phrack Magazine, 1998,8(52):18~18.
  • 4刘美兰,姚京松.审计跟踪与入侵检测[J].计算机工程与应用,1999,35(7):12-15. 被引量:12

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部