期刊文献+

STBAC:一种新的操作系统访问控制模型 被引量:5

STBAC:A New Access Control Model for Operating System
下载PDF
导出
摘要 现代操作系统的主要威胁来自网络,传统访问控制机制在这方面尚有不足.提出一种应用于操作系统的访问控制模型——STBAC,可以有效防御网络攻击,并保持较好的兼容性和易用性.即使系统被攻破,STBAC模型仍然能保护关键资源,使入侵者无法达到真正的破坏目的.STBAC模型以进行过不可信远程通信的进程为可疑感染的起点,依据感染规则追踪可疑感染进程及其子进程在内核中的活动,依据保护规则禁止可疑感染进程非法访问关键资源,以防止系统关键资源遭到破坏.对原型系统的测试表明,STBAC模型在不明显影响系统兼容性和性能的前提下,可以有效地保护系统安全. With the rapid development and increasing use of network, threats to modern operating systems mostly come from network, such as buffer overflows, viruses, worms, Trojans, DOS, etc. On the other hand, as computers, especially PCs, become cheaper and easier to use, people prefer to use computers exclusively and share information through network. The traditional access control mechanisms, however, can not deal with them in a smart way. Traditional DAC in OS alone cannot defeat network attacks well. Traditional MAC is effective in maintaining security, but it has problems of application incompatibility and administration complexity. To this end, a new access control model named STBAC for operating system is proposed which can defeat attacks from network while maintaining good compatibility, simplicity and performance. Even in the cases when some processes are subverted, STBAC can still protect vital resources, so that the intruder cannot reach his/her final goal. STBAC regards processes that have done non-trustable-communication as starting points of suspicious taint, traces the activities of the suspiciously tainted processes and their child processes by taint rules, and forbids the suspiciously tainted processes to illegally access vital resources by protection rules. The tests on the STBAC prototype show that it can protect system security effectively without imposing heavy compatibility and performance impact upon operating system.
出处 《计算机研究与发展》 EI CSCD 北大核心 2008年第5期758-764,共7页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60703103) 国家“八六三”高技术研究发展计划基金项目(2007AA01Z414) 中国人民大学科研基金项目(06XNB053)~~
关键词 操作系统 访问控制 信息流 安全性 可疑感染 operating system access control information flow security suspicious taint
  • 相关文献

参考文献15

  • 1]Lee Badger,Daniel F Sterne,David L Sherman,et al.A domain and type enforcement UNIX prototype[C].The 5th USENIX UNIX Security Symposium,Salt Lake,USA,1995 被引量:1
  • 2Timothy Fraser.LOMAC:Low water-mark integrity protection for COTS environments[C].The IEEE Symp on Security and Privacy,Oakland,CA,2000 被引量:1
  • 3Timothy Fraser.LOMAC:MAC you can live with[C].The FREENIX Track,USENIX Annual Technical Conference,Boston,2001 被引量:1
  • 4Ninghui Li,Ziqing Mao,Hong Chen.Usable mandatory integrity protection for operating systems[C].IEEE Symp on Security and Privacy(SP'07),Oakland,USA,2007 被引量:1
  • 5Information technology security evaluation criteria(ITSEC)[R].Commission of the European Communities,Tech Rep:Version 1.2,1991 被引量:1
  • 6J C Knight,E A Strunk,K J Sullivan.Towards a rigorous definition of information system survivability[C].The DARPA Information Survivability Conference and Exposition (DISCEX'03),Washington,USA,2003 被引量:1
  • 7D E DENNING.A lattice model of secure information flow[J].Communications of ACM,1976,19(5):236-243 被引量:1
  • 8S T King,P M Chen.Backtracking intrusions[C].ACM Symp on Operating Systems Principles(SOSP 2003),New York,USA,2003 被引量:1
  • 9单智勇,孙玉芳.带二级缓冲机制的通用访问控制框架研究及实现[J].计算机学报,2004,27(11):1576-1584. 被引量:3
  • 10单智勇,孙玉芳.一个应用于操作系统的RBAC模型及其实施[J].计算机研究与发展,2004,41(2):287-298. 被引量:11

二级参考文献37

  • 1钟华,冯玉琳,姜洪安.扩充角色层次关系模型及其应用[J].软件学报,2000,11(6):779-784. 被引量:91
  • 2D F Ferraiolo, R Kuhn. Role-based access control. The 15th National Computer Security Conf, Baltimore, MD, 1992. http://hissa.ncsl.nist.gov/kuhn 被引量:1
  • 3R S Sandhu et al. Role-based access control models. IEEE Computer, 1996, 29(2): 38~47 被引量:1
  • 4P Loscocco et al.The Inevitability of failure: The flawed assumption of security in modern computing environments, national security agency. The 21st National Information Systems Security Conf, Virginia, USA, 1997 被引量:1
  • 5David F Ferraiolo. An argument for the role-based access control model. The 6th ACM Symp on Access Control Models and Technologies, Chantilly, Virginia, USA, 2001 被引量:1
  • 6R Sandhu, P Samarati. Access control: Principles and practice. IEEE Communications, 1994, 32(9): 40~48 被引量:1
  • 7Feustel, Mayfield. The DGSA: Unmet information security challenges for operating system designers. Operating Systems Review, 1998, 32(1): 3~22 被引量:1
  • 8Research Challenges in Operating System Security, Arlington, Hilton: DARPA/ISO. 1997. http://www.ito.arpa.mil/Proceedings/OS_Security/challenges/challenges_long.html 被引量:1
  • 9J H Saltzer, M Schroeder. The protection and control of information sharing in multics. Communications of the ACM, 1974, 17(7): 388~402 被引量:1
  • 10J Hoffman. Implementing RBAC on type enforced systems. In: Proc of the 13th Annual Computer Security Applications Conf. San Diego, CA: IEEE Computer Society Press, 1997 被引量:1

共引文献10

同被引文献39

引证文献5

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部