Dissertation > Excellent graduate degree dissertation topics show

Research and design of security audit subsystem of the operating system

Author: LiuYang
Tutor: LiJianPing
School: University of Electronic Science and Technology
Course: Information and Communication Engineering
Keywords: Kernel audit Security-Enhanced Linux Secure operating system
CLC: TP393.08
Type: Master's thesis
Year: 2009
Downloads: 101
Quote: 0
Read: Download Dissertation

Abstract


Currently, computer technology has been applied in the increasingly wide areas, the more and more important message needs to be stored in the above various information systems connected to the network. Various intrusion incident frequency is rising, driven by interests, information security is a growing problem. Security operating system developed for a variety of information security problems, has a pivotal role. Security audit subsystem is security operating system in one of the many subsystems, is an important part of secure operating system, and so has a great significance for the correct implementation of security policy, the normal operation of the monitoring system as well as tectonic intrusion detection system. A secure operating system audit subsystem needs of security-related activities in the system records, inspections and audits, user behavior abstraction from the underlying operating intentions. Its main purpose is to detect and stop the invasion of illegal users of information systems, and show that the legitimate user misuse and recording system error before. The kernel is a close contact with the hardware the operating system components, the audit system at the kernel being directly from the underlying raw audit data, and can effectively reduce the possibility of audit bypass. The purpose of this study is to construct a kernel-level security on top of the operating system audit system. The main work includes: 1. Study the basic theory of the security audit given a logical model of the safety audit process, and then according to these theories. Analysis and research on the specific requirements of the domestic and international safety standards for the evaluation of information systems audit. Depth study SELinux mandatory access control mechanisms and access control policies, a way to strengthen the audit system security with SELinux access control mechanisms and strategies. 4 in-depth analysis and study of the existing audit mechanisms in Linux and implementation code, integrated application security auditing theory and kernel knowledge, set the hook function point of audit system audit, the key issues of the contents of the audit, the audit event category discusses specific solutions, planning various parts of the audit system to study the mechanism of communication between the various components and the overall architecture model proposed a kernel-level auditing system. Under the general framework of the model, one by one to achieve the various modules. 6. Research and analysis of the basic theory of the covert channel analysis of an existing covert storage channel auditing system works and defects, and proposed an improved scheme. Take full advantage of the powerful SELinux access control mechanisms, the study on the realization of the security audit subsystem and related technology, has a certain reference value for the future development of the higher level of security audit system.

Related Dissertations

  1. Role-based access control mechanism independent Research and Implementation,TP316
  2. Study on Analysis Tools for SELinux Security Policy,TP393.08
  3. Method for Analyzing Security Policies of SELinux,TP393.08
  4. Automatic Analysis of Covert Channel Based on Source Codes of Linux Kernel,TP309
  5. Design and Application Research of Secure Operating System Hybrid Multiple Policy Model,TP393.08
  6. Access control policy language research and design,TP393.08
  7. Study on Tools of SELinux Policy Configuration,TP393.08
  8. Simple operating system security research and design,TP393.08
  9. Linux security enhancement technology research and,TP316.81
  10. Secure Operating System Based on LINUX,TP316.81
  11. Embedded operating system information security research and implementation of nuclear technology,TP316
  12. A Review of Secure Operating System and Its Realizing Technology,TP316
  13. Research and Design of the Audit System in a 4~(th) Security Operating System,TP316
  14. Virtual Threads Architecture Basd on Network Gateway Operating System,TP316
  15. Research on Encrypted File System and Trusted Recovery of Secure Operating System,TP309
  16. Research and Implementation on Trusted Authorization Techniques in Secure Operating System,TP316
  17. Research of Access Control Technology on Role-Based Authorization,TP393.08
  18. Secure operating system in the Covert Channel,TP316
  19. Research and Realization on Dispatching System of Software-bus,TP273.5
  20. Study of Intrusion Prevention-in-depth System,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > Computer applications > Computer network > General issues > Computer Network Security
© 2012 www.DissertationTopic.Net  Mobile