中国科学院软件研究所机构知识库
Advanced  
ISCAS OpenIR  > 中科院软件所  > 中科院软件所
题名:
安全操作系统若干关键技术的研究
作者: 刘海峰
答辩日期: 2002
专业: 计算机应用技术
授予单位: 中国科学院软件研究所
授予地点: 中国科学院软件研究所
学位: 博士
关键词: 安全操作系统 ; 时序Petri网 ; 实时报警 ; 最小特权管理 ; 入侵检测 ; 计算机安全
其他题名: Research on Some Key Technologies of Secure Operating System
摘要: 该文以一个实际的安全操作系统开发实践为基础,对安全操作系统开发的若干关键技术进行了研究.在对安全操作系统进行整体研究的基础上,主要取得了4个方面的研究成果.第一,在分析各类安全标准审计部分的基础上,结合主流操作系统的审计模块,设计实现了符合GB17859第三级"安全标记保护级",拥有自主版权的审计子系统.在此审计系统中,通过在核内及应用程序中设置审计点,以全面地收集数据;通过在主体和客体两方面设置审计标准,使审计标准的配置更加灵活、全面;通过优化缓冲区的管理,提高了整个系统的效率.第二,引用一种新的Petri网子类——时序Petri网,利用其对审计子系统的实现方案进行建模,进而对审计系统的安全性和活性进行了分析和验证.第三,对基于系统调用序列的入侵检测进行了深入的研究,提出了一种新的基于审计事件向量的入侵检测模型(AUDIDS),这一模型除了具有系统调用序列入侵检测模型的优点外,比之已有的模型具有更丰富的语义及更高的效率.第四,论述了特权管理子系统的设计和实现.首先分析了角色管理的经典模型RBAC,在此基础上设计并实现了Seclinux的最小特权管理.最小特权管理的思想是将SecLinux超级用户的特权划分为一组细粒度的特权,分别授给不同的系统管理员,使各种系统管理员只具有完成某任务所需的特权,从而满足最小特权原理.并且在应用层实现了角色的继承、角色约束.
英文摘要: Based on design and implementation of a practical secure operating system, this paper mainly focuses on some key technologies and four principal achievements obtained during the development of the system. First of all, based on analysis of various criteria on secure audit and several mainstream audit models, this paper presents the design and implementation of an audit subsystem. It meets the 3rd Security Level - Security Label Protection defined in GB17859-1999 and now it is copyrighted. This subsystem can collect data systematically by mounting audit points in the kernel layer as well as in the application layer. By setting up audit policy on objects and subjects, the configuration is flexible and easy to use, and the performance is enhanced greatly by optimizing buffer management. Secondly, this paper introduces a new subclass of Petri Net, named temporal Petri Net, to model the schemes of audit subsystems. Therefore, we can analyze and verify the properties of system safety and liveness. The method of using temporal logic definitely breaks up the limitations which are inherent in Petri Nets and unable to describe the temporal relationships between system events. At the same time, this method also utilizes the advantages of Petri Nets so that it can effectively describe and analyze the concurrent and physical structural properties of the system, for the purpose of system verification. By doing so, some beneficial contributions are made toward the formal verification of high level secure operating systems. Thirdly, after doing deep research on the intrusion detection systems based on system-calls, this paper proposes a new model named "AUDIDS", which was based on audit event vectors. Not only does the new model retained the previous good points, but also it obtains richer semantics and higher efficiency compared to other models. Based on this model, this paper presents a few mechanisms in the real-time alert system implemented in SecLinux and improves the storing and matching methods of normal databases. Finally, the design and implementation of privilege-management system is presented. Based on analysis of the classical role-management model - RBAC, least-privilege management is implemented in SecLinux. The idea of least privilege is that administrators are given no more privileges than is necessary to enable them to do their jobs, so in our system the super user's privileges are separated into several groups of fine-gained privileges and are given to administrators based on specific task. The inheritance and constrain of roles are implemented in application layer. In summary, this paper presents several key technologies in the design and implementation of a secure operating system. The principal achievements and experiences obtained contributes to the research of our country's own secure operating systems significantly.
语种: 中文
内容类型: 学位论文
URI标识: http://ir.iscas.ac.cn/handle/311060/7622
Appears in Collections:中科院软件所

Files in This Item:
File Name/ File Size Content Type Version Access License
LW011194.pdf(2045KB)----限制开放-- 联系获取全文

Recommended Citation:
刘海峰. 安全操作系统若干关键技术的研究[D]. 中国科学院软件研究所. 中国科学院软件研究所. 2002-01-01.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[刘海峰]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[刘海峰]‘s Articles
Related Copyright Policies
Null
Social Bookmarking
Add to CiteULike Add to Connotea Add to Del.icio.us Add to Digg Add to Reddit
所有评论 (0)
暂无评论
 
评注功能仅针对注册用户开放,请您登录
您对该条目有什么异议,请填写以下表单,管理员会尽快联系您。
内 容:
Email:  *
单位:
验证码:   刷新
您在IR的使用过程中有什么好的想法或者建议可以反馈给我们。
标 题:
 *
内 容:
Email:  *
验证码:   刷新

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.

 

 

Valid XHTML 1.0!
Copyright © 2007-2017  中国科学院软件研究所 - Feedback
Powered by CSpace