The Design and Implementation of Security Defense Technology Based on Mandatory Running Control

被引:1
|
作者
Liu Jizhen [1 ]
Wu Kehe [1 ]
Tong, Zhang [2 ]
Gang, Ma [2 ]
机构
[1] North China Elect Power Univ, Dept Comp Sci & Technol, Dept Automat Control, Beijing, Peoples R China
[2] North China Elect Power Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
关键词
Mandatory Running Control; Security Defense; Monitoring Process; Kernel Protection;
D O I
10.1109/IAS.2009.236
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the multi-processed and multi-threaded complex network environment, application system will appear the unforeseen deadlock problem. This deadlock problem may cause service interruption, and even can cause the crash of the application system. On the other hand, malicious attacks on the system and other random events will also cause serious consequences. The security defense of service operating has become another important problem in the information security field. In order to solve the above problem, this article proposes the security defense technology based on Mandatory Running Control, which can solve the unpredictable deadlock problem from the system kernel level, prevent illegal process running and restrict allowed process's behavior, realizing security defense of service operating and ensuring the system running continuously and reliably. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on Mandatory Running Control.
引用
收藏
页码:770 / +
页数:3
相关论文
共 50 条
  • [21] Design and Implementation of a Security Framework for Industrial Control Systems
    Harshe, Omkar A.
    Chiluvuri, N. Teja
    Patterson, Cameron D.
    Baumann, William T.
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL INSTRUMENTATION AND CONTROL (ICIC), 2015, : 127 - 132
  • [22] Design and implementation of database security access control system
    Shao Zi-bo
    Liu Lian-zhong
    Cui Yun-chuan
    Wu Ke-song
    Proceedings of 2006 Chinese Control and Decision Conference, 2006, : 775 - 778
  • [23] The Design and Implementation of Data Security Management and Control Platform
    Zou, Hong
    Qian, Yang
    Zhao, Yanshuai
    Ding, Kun
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 368 - 378
  • [24] Design and Implementation of Cloud Security Defense System with Software Defined Networking Technologies
    Lai, Sin-Fu
    Su, Hui-Kai
    Hsiao, Wen-Hsu
    Chen, Kim-Joan
    2016 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC 2016): TOWARDS SMARTER HYPER-CONNECTED WORLD, 2016, : 292 - 297
  • [25] Design and Implementation of Security OS Based on TrustZone
    Luo Jing
    Jiang Chunhua
    Yan Xia
    PROCEEDINGS OF 2013 IEEE 11TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS (ICEMI), 2013, : 1027 - 1032
  • [26] A XML Oriented Mandatory Access Control Based on Hierarchy Security Labels
    Zhang Dongzhan
    Guo Youxian
    Wu Yashuang
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 608 - 612
  • [27] Design for Running Auxiliary Trainer Based on RF Technology
    Chu, Kaibin
    Zhu, Zhenwei
    2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 806 - 809
  • [28] Design and Implementation of Elevator Internet of Things Security Control System based on Cloud Computing
    Li, Juanjuan
    PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND COMPUTER (MACMC 2017), 2017, 150 : 80 - 83
  • [29] Design and Implementation of Intelligent Control System for Egg Incubator Based on IoT Technology
    Aldair, Ammar A.
    Rashid, Abdulmuttalib T.
    Mokayef, Mastaneh
    2018 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS AND SYSTEM ENGINEERING (ICEESE), 2018, : 49 - 54
  • [30] Design and Implementation of Traffic Signal Control System Based on Parallel Simulation Technology
    Tan, Linglong
    Zhou, Xinliang
    Su, Yu
    Wu, Fengzhi
    2020 4TH INTERNATIONAL CONFERENCE ON MACHINE VISION AND INFORMATION TECHNOLOGY (CMVIT 2020), 2020, 1518