期刊文献+

访问验证保护级安全操作系统审计机制研究

Research of Audit Mechanisms of Secure OS of B3 Level
下载PDF
导出
摘要 论述了基于B3级安全操作系统审计报警模块增强策略与方法。在审计面扩展方面,通过分析系统进程通信与资源使用特征,增加隐蔽通道审计;在报警决策方面,根据应用场景,提出了一种以具有丰富语义的审计事件为出发点的报警决策方案。通过审计事件多角度分析、安全字段参数控制、审计序列关联分析、由时间戳控制隐蔽通道阈值、引入干扰等阻止信息传递策略,增强了系统的安全性能。 How to design and develop the audit module for secure operating system of B3 level were discussed. Adding the audit of covert channel to improve the audit design by analyzing the inter process communication and the character of the system. A mechanism of alert based on the audit event was put forward. The key measure was composed of the audit of secure parameter and the analysis of interrelated event and the timestamps of the covert channel. The system secure performance was enhanced.
出处 《计算机应用研究》 CSCD 北大核心 2007年第5期101-104,共4页 Application Research of Computers
基金 国家自然科学基金资助项目(60573042) 国家"973"计划资助项目(G1999035802)
关键词 B3级 安全策略 审计事件 报警 B3 level security policy audit alert event
  • 相关文献

参考文献7

  • 1National Computer Security Center.A guide to understanding audit in trusted systems,NCSCTG2001,ver2[R].[S.l.]:[s.n.],1988.
  • 2WARRENDER C,FORREST S,PEARLMUTTER B.Detecting intrusions using system calls:alternative data models:proceedings of the IEEE Symposium on Security and Privacy[C].Los Alamitos:[s.n.],1999:133-145.
  • 3BISKUP J,FLEGEL U.Transaction-based pseudonyms in audit data for privacy respecting intrusion detection:LNCS 1907[C].Berlin:Springer-Verlag,2000:28-48.
  • 4LEE S Y,LOW W L,WONG Peiyuen.Learning fingerprints for a database intrusion detection system:proc.of the 7th European Symposium on Research in Computer Security (ESORICS)[C].[S.l.]:[s.n.],2002:264-280.
  • 5訾小超,姚立红,曾庆凯,茅兵,谢立.操作系统安全增强技术研究进展[J].高技术通讯,2003,13(7):106-110. 被引量:4
  • 6KRUEGEL C,MUTZ D,VALEUR F,et al.On the detection of anomalous system call arguments:proceedings of the 8th European Symposium on Research in Computer Security(ESORICS)[C].Gjovik:[s.n.],2003:101-118.
  • 7SCHWELLER R,GUPTA A,CHEN Y,et al.Reversible sketches for efficient and accurate change detection over network data streams:proceedings of ACM SIGCOMM Internet Measurement Conference[C].[S.l.]:[s.n.],2004:207-212.

二级参考文献17

  • 1Ingrid M O. Marshall D A. Informatin security policy.In: Information Security: An Integrated Collection of Essays. 1995.160.
  • 2America Department of Defense. Trusted computer system evaluation criteria. CSC-STD-001-83. 1983.
  • 3Carlos R. SPL: an access control language for security policies with complex constraints. In: Network and Distributed System Security Symposium Conference. 2001.
  • 4Cholvy L, Cuppens F. Analyzing consistency of security policies. In: IEEE Symposium on Security and Privacy. 1997.103.
  • 5Ravi S.Edward C. et al. IEEE Computer. 1996.29(2):38.
  • 6Abrams M D. Generalized framework for access control:an informal description. In: 13th National Computer Security Conference. 1990.
  • 7ISO/IEC. Information technology-open systems interconnection-security frameworks in open systems-parts 3: access control. 1993.
  • 8Ct A. The Rule Set Based Access Control (RSBAC)-Linux kernel security extension. In: 8th International Linux Kongress. http://www. rsbac. org/linux -kongress.pdf. 2001.
  • 9Ray S. The flask security architecture: system support for diverse security policies. In: 8th USENIX Security Symposium. 1999. 123.
  • 10SunSoft. SunSHIELD basic security module guide.http://docs-pdf.sun. com/802-1965/802-1965. pdf.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部