期刊文献+

可生存性MLS/DBMS中基于隐蔽通道的恶意事务检测 被引量:6

Covert Channel based Malicious Transaction Detection in Survivable MLS/DBMS
下载PDF
导出
摘要 多级安全数据库系统(MLS/DBMS)中并发控制协议并不能彻底消除所有的隐蔽通道.在隐蔽通道无法避免的情况下,已渗透的恶意事务可以利用隐蔽通道泄漏和篡改机密信息.为提高数据库的可生存性,首先分析了MLS/DBMS系统中的隐蔽通道,通过对真实情况的参数模拟和实验分析,结合恶意事务特征和隐蔽通道带宽的异常改变,给出可生存DBMS中的同谋事务和恶意事务的检测,并提出了同谋用户造成隐蔽通道传递性的机理以及恶意噪声事务对其的影响. Current concurrency control protocols can not eliminate all covert channels in multi-level secure database managewent systems(MLS/DBMS).Existence of covert channels leads penetrated malicious transactions leak and interpolate confidential information. To improve database survivability, covert channels in MLS/DBMS are firstly analyzed. Then Conspired and malicious noise transactions can be detected based on malicious transaction characteristics and abnormal varieties of covert channel capacities by simulated parameters and experiments according to real systems. Further, transitive property of multi-conspiracies along with the influence of malicious noise transaction is analyzed.
出处 《电子学报》 EI CAS CSCD 北大核心 2009年第6期1264-1269,共6页 Acta Electronica Sinica
基金 国家自然科学基金(No.60673127) 国家863高技术研究发展计划(No.2007AA01Z404) 江苏省支撑计划(No.BE2008135)
关键词 多级关系模型 隐蔽通道 恶意事务 同谋 multi-level secure model covert channel malicious transaction conspiracy
  • 相关文献

参考文献12

  • 1BERTINO E, SANDHU R. Database security: concepts, approaches, and challenges [ J ]. IEEE Trans on Dependable and Secure Computing,2005,2(1) :2 - 19.
  • 2GEORGE B,HARITSA J. Secure transaetion processing in real -lime database systems [A ]. Proc of ACM SIGMOD [ C ]. Tucson, USA: SIGMOD 1997,462 - 473.
  • 3BELL D E,LAPADULA L J. Secure computer systems:mathematical foundations[ R ]. Technical Report M74-244, Bedford MA:MITRE Corporation, 1973.
  • 4CAHLL, M J, ROHM U, FEKETE A D. Serializable isolation for snapshot databases[ A]. Proc of ACM SIGMOD[ C]. New York: ACM Press, 2008.729 - 738.
  • 5GEORGE B, HARITSA J. Secure buffering in firm real-time database systems[J]. VLDB J,2000,8(3 - 4) : 178 - 198.
  • 6AMMANN P, JAJODIA S,MCCOLLUM C D et al. Surviving information warfare attacks on databases [ A ]. Proc of IEEE Syrup on Security and Privacy[ C]. Oakland, CA, USA: IEEE CS Press, 1997. I64 - 174.
  • 7SON S H, CHANEY C, THOMLINSON N. Partial security policies to support timeliness in secure real-time databases [A].Proc of IEEE Syrup. on Security and Privacy[C]. Oakland,CA,USA:IEEE CS Press,1998.136-147.
  • 8SON S H, MUKKAMALA R, DAVID R. Integrating security and real-time requirements using covert channel capacity [J]. IEEE Trans on Knowledge and Data Engineering, 2000,12(6): 865 - 879.
  • 9AHMED Q N,VRBSKY S V. Maintaining security and timeless in real-tirne database system[J]. Journal of Systems and Software,2002,61(1) :15 - 29.
  • 10SHANNON C E, WEAVER W. The mathematical theory of communication[ M]. Urbana, IL: University of Illinois Press, 1949.

同被引文献88

引证文献6

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部