Suspicious-Taint-Based Access Control for Protecting OS from Network Attacks

09/01/2016
by   Zhiyong Shan, et al.
0

Today, security threats to operating systems largely come from network. Traditional discretionary access control mechanism alone can hardly defeat them. Although traditional mandatory access control models can effectively protect the security of OS, they have problems of being incompatible with application software and complex in administration. In this paper, we propose a new model, Suspicious-Taint-Based Access Control (STBAC) model, for defeating network attacks while being compatible, simple and maintaining good system performance. STBAC regards the processes using Non-Trustable-Communications as the starting points of suspicious taint, traces the activities of the suspiciously tainted processes by taint rules, and forbids the suspiciously tainted processes to illegally access vital resources by protection rules. Even in the cases when some privileged processes are subverted, STBAC can still protect vital resources from being compromised by the intruder. We implemented the model in the Linux kernel and evaluated it through experiments. The evaluation showed that STBAC could protect vital resources effectively without significant impact on compatibility and performance.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
09/03/2016

Compatible and Usable Mandatory Access Control for Good-enough OS Security

OS compromise is one of the most serious computer security problems toda...
research
11/01/2021

B-DAC: A Decentralized Access Control Framework on Northbound Interface for Securing SDN Using Blockchain

Software-Defined Network (SDN) is a new arising terminology of network a...
research
04/01/2012

Windows And Linux Operating Systems From A Security Perspective

Operating systems are vital system software that, without them, humans w...
research
10/03/2018

Distributing and Obfuscating Firewalls via Oblivious Bloom Filter Evaluation

Firewalls have long been in use to protect local networks from threats o...
research
10/06/2022

Microsoft Defender Will Be Defended: MemoryRanger Prevents Blinding Windows AV

Windows OS is facing a huge rise in kernel attacks. An overview of popul...
research
03/22/2020

Guardauto: A Decentralized Runtime Protection System for Autonomous Driving

Due to the broad attack surface and the lack of runtime protection, pote...
research
05/26/2021

Probabilistic Selective Encryption of Convolutional Neural Networks for Hierarchical Services

Model protection is vital when deploying Convolutional Neural Networks (...

Please sign up or login with your details

Forgot password? Click here to reset