A Simple Implementation and Performance Evaluation Extended-Role Based Access Control
|
|
|
- Stephany Beasley
- 10 years ago
- Views:
Transcription
1 A Simple Implementation and Performance Evaluation Extended-Role Based Access Control Wook Shin and Hong Kook Kim Dept. of Information and Communications, Gwangju Institute of Science and Technology, 1 Oryong-dong Buk-gu, Gwangju, -712, Republic of Korea Abstract:This paper addresses the complexity issues of extended-role based access control (E-RBAC) implemented under an embedded environment. Although E-RBAC can provide more trusted environment than the traditional trusted operating systems by prohibiting the attacks consisting of ordinary operations, it is expected that its implementation has performance overhead due to the procedural constraints of E-RBAC. An implementation of E-RBAC suggested in this paper reduces the overhead of E-RBAC, and it is also shown that the overhead is not significant compared to that of the previous Intrusion Detection System (IDS) solutions. Key-Words:Extended Role Based Access Control, Secure Embedded Kernel. 1 Introduction Traditional UNIX compatible systems have been operated under Discretionary Access Control (DAC) policy. Although DAC was a flexible and general purpose scheme, insufficiencies in security have been pointed out [1]. Therefore, other security policies such as mandatory access control and role based access control have been adopted into the design of operating systems to establish more trusted computing base. Mandatory Access Control (MAC) was introduced and it provides a more concrete trusted environment by controlling the flow of information [2], [3], [4]. Role Based Access Control (RBAC) was adopted to provide a more flexible execution environments while the security information is administrated in a centralized manner [5], [6]. Although several access control policies have been introduced for the development of Trusted Operating Systems (TOS), the ability of the security kernel in TOS is still limited. Current security kernels cannot deny some attacks consisting of ordinary operations, which is due to the manner of a decision making process in traditional access controls. In the current access control schemes, access control information is extracted from the access subject and object at the moment of an access, and its validity is lost after a decision. In the decision process, the legality of an access is decided based on the traditional access matrix information or the pre-defined relation between access subjects and access objects, while the associated information or hidden information between the operations is not considered at all. The Extended Role Based Access Control (E-RBAC) was proposed to overcome the limitation and to extend the functionality of traditional access controls [7]. E-RBAC controls accesses based on associated access control information as well as the traditional access control information. On the contrary to the traditional access controls, an E-RBAC system considers additional information to make access decisions, thus it is expected that its implementation has more performance overhead than the implementations of the previous security kernels. Therefore, in a designer viewpoint, it is necessary to make sure how much overheads are introduced in the implementation. In this paper, we implement a simple E-RBAC system under an embedded environment and evaluate its performance overhead. This paper is organized as follows. In Sect. 2, we briefly review the E-RBAC concept and its model. In Sect. 3, the implementation architecture is discussed and the results of the performance evaluations are presented in Sect. 4. In Sect. 5, we conclude this paper. 2 The Extended Role Based Access Control (E-RBAC) E-RBAC limits accesses based on the associated access control information. The information is represented as an ordered set of operations that are
2 Positive The permitted behavioral patterns of log file management (lf, open) (lf, read) (lf, close) (lf, open) (lf, write) (lf, close) (lf, open) (lf, close) Fig. 1: Examples of several operation sequences having a positive PC. Negative The prohibited behavioral pattern of the race condition attack (s1, execute) (f1, unlink) (f1, f2, symlink) Fig. 2: Examples of several operation sequences having a negative PC. specified as procedural constraints (PC) in the E-RBAC model [7]. PC is defined as a partially ordered set of permissions with a positive or a negative value. A positive PC unit describes a permissible sequence of executions but a negative PC unit represents a dangerous one. Fig. 1 shows examples of operation sequences having the positive PC. The positive PCs describe the permitted execution sequences related with log file management. As shown in Fig. 1, there are three allowed execution sequences: First, open a log file, read it several times, and close the file. Second, users can write some data after opening the log file, and close it. Third, open the file, and then close the log file without any action. In this system, `read-write' access is not permitted for the log file. It is reasonable Fig. 3: An example of a negative PC represented by CCPN. because read-only and write-only operations are enough to record and inquire audit data. Moreover, some attacks erase the log record that includes attacker's information. The attacks read and find the record of the log data, and then remove the record or replace it with the other information. Putting all accounts together, it is reasonable not to support `read-write' operations. This kind of context can be a part of the security policy of the system, and the positive PCs support its enforcement effectively. Fig.2 shows an example of the negative PC. The negative PC models a race condition attack against a sendmail daemon [8]. The attack executes the sendmail program, and repeats linking and unlinking to redirect the binding between the sendmail program and a temporary file. The core execution sequence of the attack can be modeled as the state-transition diagram. E-RBAC detects and denies the attack if the execution sequence is specified. E-RBAC considers procedural information as well as the traditional access information to judge the legality of each access so that the system prohibits system intrusions more effectively. An operation is denied if it accomplishes a negative execution procedure, or if it deviates from the defined positive sequences. E-RBAC has its formal model to specify an E-RBAC system and to verify correctness of security configuration of the system. The Coloured Petri Net (CPN) based formal model, Constrained CPN (CCPN) was proposed and it specifies the E-RBAC system including the positive and negative PCs [7].
3 Fig. 4: Examples of an attack execution and its detection. The specification can be verified with automated tools such as CPN Tools [9]. Fig.3 shows an example of negative PC which is modeled with CCPN formalism. 3 Implementation TOS has been implemented based on various kernels [2], [3], [4], [5], [6], [1]. There was no even a de facto standard for the implementation, although the core function of access control and the security policy of the implementations are not so different. However, there was a remarkable movement in the field of TOS based on monolithic Linux kernels. The Linux Security Module (LSM) [11] was developed to provide a bottle-neck interface for access controls. Various access control policies can be enforced by the policies are implemented as the Loadable Kernel Modules. LSM is accepted officially as one of the security mechanisms of the Linux kernel from the kernel version 2.6. Additionally, SELinux, the most representative security kernel based on Linux, adopted it as its core framework of access controls. Therefore, LSM consolidates itself as the standard access control framework in Linux systems. However, the LSM approach is not so reasonable for our implementation, because the LSM is too heavy mechanism to be ported into our tiny system. We implement our system on an embedded board, IFC-ETK [13], using the se bit EISC processor [14]. The se328 processor is a 16-bit processor actually, but it emulates 32-bit operations internally. Since there is no Memory Management Unit (MMU), the operating system is uclinux version that can support the environment without MMU. The target embedded system has limitations in computational power and functions being compared to the Linux systems on desktop machines. Many functions defined in LSM are not necessary in the embedded target. Some technologies in LSM are not supported in the system such as Loadable Kernel Module (LKM). Therefore, it can be an overhead to adopt the LSM architecture into such lightweight systems. Moreover, the LSM approach is not proven as the best or the most efficient solution for TOS development [12]. Therefore, we implement our access control structure by directly modifying kernel functions of the system instead of taking the LSM architecture. At first, we simply add the field of a permission vector to the data structures of process and files. The permission vectors are calculated in terms of permitted roles. The relation between processes, roles, behaviors, and permissions is also evaluated as E-RBAC model which is described in [7], and the set of allowed permissions for the roles is calculated finally. Access control decision functions (ADF) decide the legality of each access comparing the roles of a process and a file. They are implemented as kernel functions. Their functions are not so different from those of the other TOS implementations. In addition, we add fields to trace the current state of the process in term of the CCPN model. Each process has its state information, and the state is changed by the execution of operations of the process. ADF calculates the next state according to the current state and the action that the process wants to execute. All processes itinerate CCPN by executing operations. From the traces, we can investigate the execution sequence of operations of each access subject. Fig. 5 (a) shows the execution time of the simple execution program and Fig. 5 (b) shows the results of the copy program. Each program is executed repeatedly from times to times, and the execution time is measured by using the wait3() function. As shown in the figures, without procedural constraints, there is no significant overhead in the E-RBAC system compared to the original kernel. On the other hand, Fig. 5 (c) shows the different execution times between original kernel and our implementation. With procedural constraints, there is an overhead caused from the state tracing. It is shown from Fig. 6 that the overhead linearly increases as the repetition increases and the average of the overhead is about 7 milliseconds which corresponds to 1 percent increase in overhead. The overhead is almost equal to or larger than the overheads of SELinux [1]. However, it is not larger than the overhead of an application level IDS solution, snort [15], when the overhead of operations in snort is measured in a firewall-applied environment.
4 Simple Execution Test Original Kernel Modified Kernel Overheads (Avg. :.6732 sec) (a) Fig. 6: The overheads. File Copy Test Original Kernel (b) Execution Test 2 Original Kernel Modified Kernel (c) Modified Kernel Fig. 5: Comparison of the execution time between the original kernel and the modified kernel using E-RBAC from (a) a simple execution program, (b) a copy program, and (c) a log read program. 4 Conclusion In this paper, we introduced an E-RBAC implementation and discussed its performance evaluation results. The extended access control efficiently limits attack trials consisting of allowed operations. For example, the implementation detected the sendmail race condition attack successfully. Also, the performance overhead was evaluated with three simple programs. When operations were executed without procedural constraints, there was no significant overhead. On the contrary, the performance overhead was observed with procedural constraints. However, the overhead was not larger than the current IDS solution. Considering that E-RBAC provides more fundamental security mechanisms which cannot be by-passed, this amount of overhead can be a bearable overhead. Moreover, usually in lightweight systems such as our embedded environment, it is impossible to execute heavy programs such as IDS. Acknowledgement This research was partially supported by the University Research Program of the Ministry of Information and Communication, Republic of Korea. In addition, this work was supported in part by the Korea Science and Engineering Foundation (KOSEF) through the Ultra-Fast Fiber-Optic Networks Research Center at Gwangju Institute of Science and Technology. References: [1] Sandhu, R. and Samarati, P., Access Control: Principles and Practice, IEEE Communications, Volume 32, Number 9, September 1994.
5 [2] UNICOS Multilevel Security (MLS) Feature User's Guide, SG , Cray Research, Inc [3] Branstad, M., Tajalli, H., Mayer, F., Security issues of the Trusted Mach system., Proc. of 4th Aerospace Computer Security Applications Conference, pp , [4] Flask: [5] Ott, A., The Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension, 8th Int. Linux Kongress, Enschede 21 [6] Trusted Solaris: is/index.html [7] Shin, W., Lee, J.G., Kim, H.K., and Sakurai, K. Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling, IEICE Transactions on Fundamentals, Special Section on Cryptography and Information Security(to be issued), Vol.E88-A, No.1, Jan. 25. [8] [8lgm]-Advisory-2.UNIX.SunOSsendmailV5.1-Aug-1995.README [9] CPN Tools: [1] Loscocco, P., Smalley, S., Integrating Flexible Support for Security Policies into the Linux Operating System. Proc. of the FREENIX Track: 21 USENIX Annual Technical Conference (FREENIX '1), 21. [11] LSM: [12] gresecurity: [13] InterFC: [14] Advanced Digital Chips Inc.: [15] Snort:
Using the Flask Security Architecture to Facilitate Risk Adaptable Access Controls
Using the Flask Security Architecture to Facilitate Risk Adaptable Access Controls Machon Gregory Peter Loscocco [email protected] [email protected] National Security Agency Abstract Risk Adaptable
Safety measures in Linux
S a f e t y m e a s u r e s i n L i n u x Safety measures in Linux Krzysztof Lichota [email protected] A g e n d a Standard Unix security measures: permissions, capabilities, ACLs, chroot Linux kernel
Protection of Components based on a Smart Card Enhanced Security Module
Protection of Components based on a Smart Card Enhanced Security Module J. García-Alfaro 1,2, S. Castillo 1, J. Castellà-Roca, 3 G. Navarro 1, and J. Borrell 1 1 Autonomous University of Barcelona, Department
Secure computing: SELinux
Secure computing: SELinux Michael Wikberg Helsinki University of Technology [email protected] Abstract Using mandatory access control greatly increases the security of an operating system. SELinux,
SELinux. Security Enhanced Linux
SELinux Security Enhanced Linux Introduction and brief overview. Copyright 2005 by Paweł J. Sawicki http://www.pawel-sawicki.com/ Agenda DAC Discretionary Access Control ACL Access Control Lists MAC Mandatory
Linux Distributed Security Module 1
Linux Distributed Security Module 1 By Miroslaw Zakrzewski and Ibrahim Haddad This article describes the implementation of Mandatory Access Control through a Linux kernel module that is targeted for Linux
Analysis of the Linux Audit System 1
Analysis of the Linux Audit System 1 Authors Bruno Morisson, MSc (Royal Holloway, 2014) Stephen Wolthusen, ISG, Royal Holloway Overview Audit mechanisms on an operating system (OS) record relevant system
Security Enhanced Linux and the Path Forward
Security Enhanced Linux and the Path Forward April 2006 Justin Nemmers Engineer, Red Hat Agenda System security in an insecure world Red Hat Enterprise Linux Security Features An overview of Discretionary
Mandatory Access Control in Linux
Mandatory Access Control in Linux CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ In the early 2000s Root and administrator Many
CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD
CAPP-Compliant Security Event Audit System for Mac OS X and FreeBSD Robert N. M. Watson Security Research Computer Laboratory University of Cambridge March 23, 2006 Introduction Background Common Criteria,
Kernel Types System Calls. Operating Systems. Autumn 2013 CS4023
Operating Systems Autumn 2013 Outline 1 2 Types of 2.4, SGG The OS Kernel The kernel is the central component of an OS It has complete control over everything that occurs in the system Kernel overview
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
A Survey of Access Control Policies
A Survey of Access Control Policies Amanda Crowell University of Maryland [email protected] ABSTRACT Modern operating systems each have different implementations of access controls and use different
Confining the Apache Web Server with Security-Enhanced Linux
Confining the Apache Web Server with Security-Enhanced Linux Michelle J. Gosselin, Jennifer Schommer [email protected], [email protected] Keywords: Operating System Security, Web Server Security, Access
Secure to the Core: The Next Generation Secure Operating System from CyberGuard
Secure to the Core: The Next Generation Secure Operating System from CyberGuard Paul A. Henry MCP+I, MCSE, CCSA, CCSE, CFSA, CFSO, CISSP, CISM, CISA Senior Vice President CyberGuard Corp A CyberGuard Corporation
User Authentication Platform using Provisioning in Cloud Computing Environment
User Authentication Platform using Provisioning in Cloud Computing Environment Hyosik Ahn, Hyokyung Chang, Changbok Jang, Euiin Choi Dept. Of Computer Engineering, Hannam University, Daejeon, Korea {hsahn,
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
Access Control. ITS335: IT Security. Sirindhorn International Institute of Technology Thammasat University ITS335. Access Control.
ITS335: IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 10 October 2013 its335y13s2l04, Steve/Courses/2013/s2/its335/lectures/access.tex,
System Assurance C H A P T E R 12
C H A P T E R 12 System Assurance 169 The aim of system assurance is to verify that a system enforces a desired set of security goals. For example, we would like to know that a new operating system that
Rule Set Based Access Control (RSBAC)
Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Short Overview for OpenWeekend 2002 in Prague Amon Ott Contents: 1 Introduction 1.1 History 1.2 Motivation 1.3 Design
LSM-based Secure System Monitoring Using Kernel Protection Schemes
LSM-based Secure System Monitoring Using Kernel Protection Schemes Takamasa Isohara, Keisuke Takemori, Yutaka Miyake KDDI R&D Laboratories Saitama, Japan {ta-isohara, takemori, miyake}@kddilabs.jp Ning
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using Raspberry PI
Volume: 2, Issue: 7, 20-27 July 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Miss Rohini Vidhate Savitribai Phule Pune University. Mr. V. D. Shinde Savitribai
Access Control. 1 Overview of Access Control. Lecture Notes (Syracuse University) Access Control: 1. What is Access Control?
Lecture Notes (Syracuse University) Access Control: 1 Access Control 1 Overview of Access Control What is Access Control? The ability to allow only authorized users, programs or processes system or resource
The Flask Security Architecture A Flexible Mandatory Access Control Mechanism For Use in Multiple Secure Systems
The Flask Security Architecture A Flexible Mandatory Access Control Mechanism For Use in Multiple Secure Systems Jeffrey Barr Professor Tom Perrine San Diego State University Computer Science 574 6 December
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 7 Access Control Fundamentals
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 7 Access Control Fundamentals Objectives Define access control and list the four access control models Describe logical access control
ontune SPA - Server Performance Monitor and Analysis Tool
ontune SPA - Server Performance Monitor and Analysis Tool Product Components - ontune is composed of the Manager; the Agents ; and Viewers Manager - the core ontune component, and installed on the management/viewing
Survey on Linux Security and Vulnerabilities
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -9 September, 2014 Page No. 8265-8269 Survey on Linux Security and Vulnerabilities Ashvini T. Dheshmukh
RSBAC - a framework for enhanced Linux system security
RSBAC - a framework for enhanced Linux system security Marek Jawurek RWTH-Aachen Abstract Operating systems traditionally bring their own means of protection against any kind of threats. But often the
Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley
Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,
How To Write Security Enhanced Linux On Embedded Systems (Es) On A Microsoft Linux 2.2.2 (Amd64) (Amd32) (A Microsoft Microsoft 2.3.2) (For Microsoft) (Or
Security Enhanced Linux on Embedded Systems: a Hardware-accelerated Implementation Leandro Fiorin, Alberto Ferrante Konstantinos Padarnitsas, Francesco Regazzoni University of Lugano Lugano, Switzerland
An Implementation Of Multiprocessor Linux
An Implementation Of Multiprocessor Linux This document describes the implementation of a simple SMP Linux kernel extension and how to use this to develop SMP Linux kernels for architectures other than
Implementation of the Remote Control and Management System. in the Windows O.S
IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.8, August 2012 11 Implementation of the Remote Control and Management System in the Windows O.S Seung-Ju Jang Dong-Eui University,
Introduction to Android 5 Security
Introduction to Android 5 Security Lukáš Aron and Petr Hanáček Faculty of Information Technology, Department of Intelligent Systems, Brno University of Technology [email protected] Abstract. This paper
Pre-scheduled Control of Online Device-Based Backup and Incremental Data Backup in VMware Virtual System Environment
X Triennial International SAUM Conference on Systems, Automatic Control and Measurements Niš, Serbia, November 10 th -12 th, 2010 Pre-scheduled Control of Online Device-Based Backup and Incremental Data
Example of Standard API
16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface
Linux Security on HP Servers: Security Enhanced Linux. Abstract. Intended Audience. Technical introduction
Linux Security on HP Servers: Security Enhanced Linux Technical introduction This white paper -- one in a series of Linux security white papers -- discusses Security Enhanced Linux (SELinux), a mandatory
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
A Firewall Model of File System Security
Ph.D Dissertation Proposal A Firewall Model of File System Security By Lihui Hu Department Of Computer Science Michigan Technological University March 2010 Committee Members: Dr. Jean Mayo, Chair Dr. Steve
Role Based Access Control (RBAC) Nicola Zannone
Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
Linux OS-Level Security Nikitas Angelinas MSST 2015
Linux OS-Level Security Nikitas Angelinas MSST 2015 Agenda SELinux SELinux issues Audit subsystem Audit issues Further OS hardening 2 SELinux Security-Enhanced Linux Is NOT a Linux distribution A kernel
Toasterkit - A NetBSD Rootkit. Anthony Martinez Thomas Bowen http://mrtheplague.net/toasterkit/
Toasterkit - A NetBSD Rootkit Anthony Martinez Thomas Bowen http://mrtheplague.net/toasterkit/ Toasterkit - A NetBSD Rootkit 1. Who we are 2. What is NetBSD? Why NetBSD? 3. Rootkits on NetBSD 4. Architectural
Dynamic Load Balancing of Virtual Machines using QEMU-KVM
Dynamic Load Balancing of Virtual Machines using QEMU-KVM Akshay Chandak Krishnakant Jaju Technology, College of Engineering, Pune. Maharashtra, India. Akshay Kanfade Pushkar Lohiya Technology, College
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions
A M D DA S 1. 0 For the Manageability, Virtualization and Security of Embedded Solutions AMD DAS (DASH, AMD Virtualization (AMD-V ) Technology, and Security) 1.0 is a term used to describe the various
CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure
CSE 120 Principles of Operating Systems Fall 2000 Lecture 3: Operating System Modules, Interfaces, and Structure Geoffrey M. Voelker Modules, Interfaces, Structure We roughly defined an OS as the layer
A Comparative Study of Security Features in FreeBSD and OpenBSD
Department of Computer Science Magnus Persson A Comparative Study of Security Features in FreeBSD and OpenBSD Master s Thesis 2006:02 A Comparative Study of Security Features in FreeBSD and OpenBSD Magnus
Putting it on the NIC: A Case Study on application offloading to a Network Interface Card (NIC)
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE CCNC 2006 proceedings. Putting it on the NIC: A Case Study on application
PATROL Console Server and RTserver Getting Started
PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
A Comparison on Current Distributed File Systems for Beowulf Clusters
A Comparison on Current Distributed File Systems for Beowulf Clusters Rafael Bohrer Ávila 1 Philippe Olivier Alexandre Navaux 2 Yves Denneulin 3 Abstract This paper presents a comparison on current file
Role Based Access Control: Adoption and Implementation in the Developing World
Role Based Access Control: Adoption and Implementation in the Developing World By Loy A.K. Muhwezi Master s Thesis in Computer Science Thesis number: Supervised By Dr. Martijn Oostdijk Radboud University
Access Control Framework of Personal Cloud based on XACML
Access Control Framework of Personal Cloud based on XACML 1 Jun-Young Park, 2 Young-Rok Shin, 3 Kyoung-Hun Kim, 4 Eui-Nam Huh 1First Author, 2 Kyung Hee University, {parkhans, shinyr}@khu.ac.kr 3 Gangdong
Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85
Information Security Measures and Monitoring System at BARC - R.S.Mundada Computer Division B.A.R.C., Mumbai-85 Information Security Approach Secure Network Design, Layered approach, with SPF and Application
Last Class: OS and Computer Architecture. Last Class: OS and Computer Architecture
Last Class: OS and Computer Architecture System bus Network card CPU, memory, I/O devices, network card, system bus Lecture 3, page 1 Last Class: OS and Computer Architecture OS Service Protection Interrupts
PFP Technology White Paper
PFP Technology White Paper Summary PFP Cybersecurity solution is an intrusion detection solution based on observing tiny patterns on the processor power consumption. PFP is capable of detecting intrusions
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
DJRA1.6 FINAL RELEASE OF NEW GRID MIDDLEWARE SERVICES
3.9. ACTIVE SECURITY INFRASTRUCTURE (ASI) 3.9.1. Overview The aim of the Active Security task is to consider security measures for an interactive framework. To date Grid security activities have largely
Operating System Structure
Operating System Structure Lecture 3 Disclaimer: some slides are adopted from the book authors slides with permission Recap Computer architecture CPU, memory, disk, I/O devices Memory hierarchy Architectural
Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH
Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Tutorial Amon Ott Contents: 1 Motivation: Why We Need Better Security in the Linux Kernel 2 Overview of RSBAC 3 How
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
Self-Service Active Directory Group Management
Self-Service Active Directory Group Management 2015 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID Group Manager is a self-service group membership request portal. It allows users to request
Taking the Open Source Road
The National Security Agency s Review of Emerging Technologies Taking the Open Source Road Raising the Bar in Operating System Security Cryptographic Binding of Metadata Providing a Secure Foundation with
Implementation of Buffer Cache Simulator for Hybrid Main Memory and Flash Memory Storages
Implementation of Buffer Cache Simulator for Hybrid Main Memory and Flash Memory Storages Soohyun Yang and Yeonseung Ryu Department of Computer Engineering, Myongji University Yongin, Gyeonggi-do, Korea
Advanced Systems Security: Retrofitting Commercial Systems
Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA Advanced Systems Security:
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation
Efficient Data Recovery scheme in PTS-Based OFDM systems with MATRIX Formulation Sunil Karthick.M PG Scholar Department of ECE Kongu Engineering College Perundurau-638052 Venkatachalam.S Assistant Professor
CSE543 - Introduction to Computer and Network Security. Module: Operating System Security
CSE543 - Introduction to Computer and Network Security Module: Operating System Security Professor Trent Jaeger 1 OS Security So, you have built an operating system that enables user-space processes to
Operating System Structures
COP 4610: Introduction to Operating Systems (Spring 2015) Operating System Structures Zhi Wang Florida State University Content Operating system services User interface System calls System programs Operating
Protecting the Cloud from Inside
Protecting the Cloud from Inside Intra-cloud security intelligence Protection of Linux containers Mitigation of NoSQL injections Alexandra Shulman-Peleg, PhD Cloud Security Researcher, IBM Cyber Security
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Two security patterns: Least Privilege and Security Logger and Auditor
Two security patterns: Least Privilege and Security Logger and Auditor Eduardo B. Fernandez 1, Sergio Mujica 2, and Francisca Valenzuela 2 1 Dept. of Comp. Science and Eng., Florida Atlantic University,
IS TEST 3 - TIPS FOUR (4) levels of detective controls offered by intrusion detection system (IDS) methodologies. First layer is typically responsible for monitoring the network and network devices. NIDS
CMSC 421, Operating Systems. Fall 2008. Security. URL: http://www.csee.umbc.edu/~kalpakis/courses/421. Dr. Kalpakis
CMSC 421, Operating Systems. Fall 2008 Security Dr. Kalpakis URL: http://www.csee.umbc.edu/~kalpakis/courses/421 Outline The Security Problem Authentication Program Threats System Threats Securing Systems
A Linux Kernel Auditing Tool for Host-Based Intrusion Detection
A Linux Kernel Auditing Tool for Host-Based Intrusion Detection William A. Maniatty, Adnan Baykal, Vikas Aggarwal, Joshua Brooks, Aleksandr Krymer and Samuel Maura [email protected] CSI 424/524, William
An Artificial Immune Model for Network Intrusion Detection
An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,
Audit Trail Administration
Audit Trail Administration 0890431-030 August 2003 Copyright 2003 by Concurrent Computer Corporation. All rights reserved. This publication or any part thereof is intended for use with Concurrent Computer
Securing your Linux Server: Racing against the attacker. Nigel Edwards Hewlett-Packard <[email protected]>
Securing your Linux Server: Racing against the attacker Nigel Edwards Hewlett-Packard Agenda The major source of security vulnerabilities Security strategies Patching Layered utilities
Summary of the SEED Labs For Authors and Publishers
SEED Document 1 Summary of the SEED Labs For Authors and Publishers Wenliang Du, Syracuse University To help authors reference our SEED labs in their textbooks, we have created this document, which provides
Certification Report
Certification Report EAL 4+ Evaluation of Solaris 10 Release 11/06 Trusted Extensions Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
NSA Security-Enhanced Linux (SELinux)
NSA Security-Enhanced Linux (SELinux) http://www.nsa.gov/selinux Stephen Smalley [email protected] Information Assurance Research Group National Security Agency Information Assurance Research Group 1
SOS: Software-Based Out-of-Order Scheduling for High-Performance NAND Flash-Based SSDs
SOS: Software-Based Out-of-Order Scheduling for High-Performance NAND -Based SSDs Sangwook Shane Hahn, Sungjin Lee, and Jihong Kim Department of Computer Science and Engineering, Seoul National University,
Host Hardening. OS Vulnerability test. CERT Report on systems vulnerabilities. (March 21, 2011)
Host Hardening (March 21, 2011) Abdou Illia Spring 2011 CERT Report on systems vulnerabilities Source: CERT Report @ http://www.kb.cert.org/vuls/bymetric 2 OS Vulnerability test Source: http://www.omninerd.com/articles/2006_operating_system_vulnerabilit
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
POSMan Great Solution to Large POS Networks
Název aplikace...best for the best POSMan Great Solution to Large POS Networks th (V 1.1, released on 18. August 2006) Remark: This is a confidential document that might be used by the second party only
Securing Data in a RHEL SELinux Multi-Level Secure Environment
Securing Data in a RHEL SELinux Multi-Level Secure Environment 201504 MLS Overview Red Hat Enterprise Linux (RHEL) forms the foundation of the Multi-Level Security (MLS) system Security Enhanced Linux
The CVS-Server Case Study: A Formalized Security Architecture
The CVS-Server Case Study: A Formalized Security Architecture Extended Abstract Achim D. Brucker, Frank Rittinger, and Burkhart Wolff {brucker,rittinge,wolff}@informatik.uni-freiburg.de 1 Introduction
Network Mobility Support Scheme on PMIPv6 Networks
Network Mobility Support Scheme on PMIPv6 Networks Hyo-Beom Lee 1, Youn-Hee Han 2 and Sung-Gi Min 1 1 Dept. of Computer Science and Engineering, Korea University, Seoul, South Korea. [email protected]
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions
Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions Abstract Coyote Point Equalizer appliances deliver traffic management solutions that provide high availability,
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
Implementation and Automatic Testing for Security Enhancement of Linux Based on Least Privilege
Implementation and Automatic Testing for Security Enhancement of Linux Based on Least Privilege Gaoshou Zhai, Jie Zeng, Miaoxia Ma, Liang Zhang School of Computer and Information Technology, Beijing Jiaotong
Techniques for Securing Networks against Criminal Attacks
Techniques for Securing Networks against Criminal Attacks Ernst-Georg Haffner, Thomas Engel, Christoph Meinel Institute of Telematics Bahnhofstraße 30-32 D-54292 Trier, Germany Abstract The main Internet
