The Design and Implementation of Security Defense Technology Based on Mandatory Running Control

被引:1
|
作者
Liu Jizhen [1 ]
Wu Kehe [1 ]
Tong, Zhang [2 ]
Gang, Ma [2 ]
机构
[1] North China Elect Power Univ, Dept Comp Sci & Technol, Dept Automat Control, Beijing, Peoples R China
[2] North China Elect Power Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
关键词
Mandatory Running Control; Security Defense; Monitoring Process; Kernel Protection;
D O I
10.1109/IAS.2009.236
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the multi-processed and multi-threaded complex network environment, application system will appear the unforeseen deadlock problem. This deadlock problem may cause service interruption, and even can cause the crash of the application system. On the other hand, malicious attacks on the system and other random events will also cause serious consequences. The security defense of service operating has become another important problem in the information security field. In order to solve the above problem, this article proposes the security defense technology based on Mandatory Running Control, which can solve the unpredictable deadlock problem from the system kernel level, prevent illegal process running and restrict allowed process's behavior, realizing security defense of service operating and ensuring the system running continuously and reliably. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on Mandatory Running Control.
引用
收藏
页码:770 / +
页数:3
相关论文
共 50 条
  • [1] RESEARCH AND DESIGN OF MANDATORY RUNNING CONTROL
    Li Wei
    Wu Ke-He
    Zhang Tong
    Ma Gang
    INTELLIGENT DECISION MAKING SYSTEMS, VOL. 2, 2010, : 119 - 124
  • [2] The Design and Implementation of Security Defense System Based on Android
    Huang, Min
    Guo, Jiangbo
    Zhang, BaoShuai
    Zhang, Tian
    Ren, Pengpeng
    PROCEEDINGS OF 2017 8TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2017), 2017, : 292 - 295
  • [3] The Design of Website Security Defense System Based on Honeypot Technology
    Yao, Jun
    Chen, Jing
    PROCEEDINGS OF THE 2016 2ND WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS, 2016, 81 : 1502 - 1507
  • [4] Design and Implementation of Linux File Mandatory Access Control
    Tian, Liye
    Rong, Xing
    Lu, Tingting
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 15 - +
  • [5] Design and implementation of security system for smart home based on IOT technology
    Sisavath, Chanthaphone
    Yu, Lasheng
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY, 2021, 183 : 4 - 13
  • [6] Design and Implementation of Dynamic Web Security and Defense Mechanism based on NDIS Intermediate Driver
    Dai, Shuo
    Du, Ye
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 1, PROCEEDINGS, 2009, : 506 - 509
  • [7] RETRACTED: Design and Implementation of Cloud Computing Network Security Virtual Computing and Defense Technology (Retracted Article)
    Cheng, Yongbing
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [8] Design and Implementation for Early Warning System of Airfield Security Defense
    Fu Xinhua
    Yan Yongjia
    PROCEEDINGS OF 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2015), 2015, : 364 - 366
  • [9] The Design of Power Security Defense System Based on Resource Pool Cloud Computing Technology
    Nan, Dang
    INTERNATIONAL JOURNAL OF INFORMATION SYSTEM MODELING AND DESIGN, 2020, 11 (01) : 1 - 11
  • [10] DESIGN AND IMPLEMENTATION OF DOOR ACCESS CONTROL AND SECURITY SYSTEM BASED ON IOT
    Sowjanya, G.
    Nagaraju, S.
    2016 INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT), VOL 2, 2016, : 83 - 86