期刊文献+

基于内核函数监控的Linux系统防护方法的研究与实现 被引量:6

Study and Implementation of Systematic Protection by Monitoring Abnormal Invocation of Linux Kernel Functions
下载PDF
导出
摘要 伴随Linux操作系统在服务器市场所占份额的迅速增长及其内核漏洞曝光率的不断增加,Linux内核安全已成为计算机系统安全领域的研究焦点之一。文章以运行Linux系统的服务器为研究对象,提出了一种基于内核函数监控的系统防护模型,试图通过限制相关服务进程所能访问的内核函数范围,使恶意攻击的难度加大进而增强Linux内核安全,同时通过对内核函数各种异常调用情况的分级分类实时处理,从而提升整个服务器系统的安全水平。原型实验结果表明,文章所提方法能够及时检测到相关服务进程对内核函数的异常调用情况,并给以适当的报警或拦截处理,而且由此带来的额外开销完全可以承受,从而验证了本文方法的可行性和有效性。与内核安全防护的其他研究工作相比,文章所提方法所涉内核防护覆盖范围更大且无需重新编译构建内核映像,并切实做到了监测与防护的有机结合。 With the wide application of Linux operating systemin the servers and the continuous exposure of kernel vulnerabilities, Linux kernel security has become one of the research focuses in the fields of computer system security. As for the server running Linux system, this paper proposed a system protection model by the way of monitoring kernel functions. It limits the kernel functions that can be accessed by the related daemons and increases the difficulty of malicious attacksso as to enhance the security of Linux kernel.Moreover, some real-time categorical processing is introduced for various abnormal invocations to the kernel functions so that the security level of the entire server system is promoted. Experimental results show that the proposed method can indeed detect the abnormal invocations of the kernel functions timely followed by some appropriate alarming or interception measures. Furthermore, the additional overloads are not too much such that the method is verified to be feasible and effective. Compared with other research work about kernel security, this method can protectbroader kernel coverage and it eliminates the need to recompile and reconstruct the kernel image while kernel monitoring and protection mechanisms are integrated organically.
作者 翟高寿 刘晨 向勇 ZHAI Gaoshou;LIU Chen;XIANG Yong(School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China;School of Computer Science and Technology, Tsinghua University, Beijing 100084, China)
出处 《信息网络安全》 CSCD 北大核心 2018年第3期26-38,共13页 Netinfo Security
基金 国家自然科学基金[61672092]
关键词 操作系统安全 内核安全 系统防护方法 服务进程 内核函数调用 security of operating systems security of kernel systematic protection daemon invocation of kernel functions
  • 相关文献

参考文献10

二级参考文献108

  • 1高微,卿斯汉,崔永祯.系统调用层的操作系统安全增强[J].计算机科学,2004,31(8):176-178. 被引量:2
  • 2[1]Wagle C C,Pu C,Beattie S,et al.Buffer Overflows:Attacks and Defenses for the Vulnerability of the Decade. DARPA Information Survivability Conference and Exposition,2000-01
  • 3[2]McGraw G, Viega J.Make Your Software Behave:Learning the Basics of Buffer Overflows:Get Reacqluainted with the Single Biggest Threat to Sofmare Security. Reliable Software Technologies,2000-03-01
  • 4[3]Aleph One:Smashing the Stack for Fun and Profit. URL:http://www.shmoo.com/phrack/Phrack49/p49-14,1996-11-08
  • 5BryantRE,0’HallaronDR,龚奕利,雷迎春译.深入理解计算机系统(第2版)[M].北京:机械工业出版社,2010.
  • 6Designer S. StackPatch[EB/OL]. http://www. opwnwall. com/ linux.
  • 7Documentation for the PaX [EB/OL]. Project: http://pax. grsecurity. net/docs/.
  • 8PaX non-executable pages design & implementation[EB/OL], http://pax. grsecurity. net/docs/noexec.txt.
  • 9Return-to-libc Attack Lab[EB/OL]. http..//www, cis. syr. edu/ -wedu/seed/Labs/Vulnerability/Return_to_libc/Return_to_libc. pdf.
  • 10Advanced return-into-lib(c) exploits (PaX case study) [EB/ OL]. http://www. phrack. org/issues. html? issue= 58&id= 4 &mode= txt.

共引文献76

同被引文献25

引证文献6

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部