The Design and Implementation of Security Defense Technology Based on Mandatory Running Control

被引:1
|
作者
Liu Jizhen [1 ]
Wu Kehe [1 ]
Tong, Zhang [2 ]
Gang, Ma [2 ]
机构
[1] North China Elect Power Univ, Dept Comp Sci & Technol, Dept Automat Control, Beijing, Peoples R China
[2] North China Elect Power Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
关键词
Mandatory Running Control; Security Defense; Monitoring Process; Kernel Protection;
D O I
10.1109/IAS.2009.236
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the multi-processed and multi-threaded complex network environment, application system will appear the unforeseen deadlock problem. This deadlock problem may cause service interruption, and even can cause the crash of the application system. On the other hand, malicious attacks on the system and other random events will also cause serious consequences. The security defense of service operating has become another important problem in the information security field. In order to solve the above problem, this article proposes the security defense technology based on Mandatory Running Control, which can solve the unpredictable deadlock problem from the system kernel level, prevent illegal process running and restrict allowed process's behavior, realizing security defense of service operating and ensuring the system running continuously and reliably. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on Mandatory Running Control.
引用
收藏
页码:770 / +
页数:3
相关论文
共 50 条
  • [31] Design and Implementation of Mobile Control APP for Teenagers Based on Big Data Technology
    Jiang, Pan
    Yang, Xiaoqian
    Kong, Huafeng
    2022 2nd International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology, CEI 2022, 2022, : 272 - 276
  • [32] Design and Implementation of Joint Operations Command and Control System Based on Component Technology
    Kong, Chen-yan
    Yang, Peng-cheng
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND TECHNOLOGY (ICCST 2015), 2015, : 264 - 271
  • [33] Defense Technology Security Education Status
    Cho, Hyoung-ryoul
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2018, PT V, 2018, 10964 : 183 - 192
  • [34] SOI photonic technology for Defense and security
    Chan, James
    Dutt, Raj
    ENABLING PHOTONICS TECHNOLOGIES FOR DEFENSE, SECURITY, AND AEROSPACE APPLICATIONS II, 2006, 6243
  • [35] Design and implementation of running state monitoring system based on WSN
    Zeng, Ying
    Li, Longgang
    Zhu, Tianyu
    Xiao, Xinqing
    Wang, Xiang
    Sun, Gege
    JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2015, 15 (03) : 395 - 403
  • [36] Display science and technology for defense and security
    Hopper, DG
    ORGANIC LIGHT-EMITTING MATERIALS AND DEVICES VII, 2004, 5214 : 1 - 10
  • [37] Security Analysis of Energy Internet With Robust Control Approaches and Defense Design
    Ge, Hui
    Zhao, Zhenjiang
    IEEE ACCESS, 2018, 6 : 11203 - 11214
  • [38] Security grid technology based on information security control theory
    Yuan, Jia-Bin
    Gu, Kai-Kai
    Yao, Li
    Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2007, 31 (04): : 422 - 425
  • [39] Security analysis of Mandatory Access Control Model
    Jiang, YX
    Lin, CC
    Yin, H
    Tan, ZX
    2004 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOLS 1-7, 2004, : 5013 - 5018
  • [40] Design and Implementation of Integrated Service Penetration Technology Cross Security Region
    Yi, Qiang
    Wan, Shupeng
    Zhang, Kai
    Chen, Peng
    Guo, Hailong
    Gao, Baoshan
    2018 2ND IEEE CONFERENCE ON ENERGY INTERNET AND ENERGY SYSTEM INTEGRATION (EI2), 2018, : 108 - 113