The Design and Implementation of Security Defense Technology Based on Mandatory Running Control

被引:1
|
作者
Liu Jizhen [1 ]
Wu Kehe [1 ]
Tong, Zhang [2 ]
Gang, Ma [2 ]
机构
[1] North China Elect Power Univ, Dept Comp Sci & Technol, Dept Automat Control, Beijing, Peoples R China
[2] North China Elect Power Univ, Dept Comp Sci & Technol, Beijing, Peoples R China
关键词
Mandatory Running Control; Security Defense; Monitoring Process; Kernel Protection;
D O I
10.1109/IAS.2009.236
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the multi-processed and multi-threaded complex network environment, application system will appear the unforeseen deadlock problem. This deadlock problem may cause service interruption, and even can cause the crash of the application system. On the other hand, malicious attacks on the system and other random events will also cause serious consequences. The security defense of service operating has become another important problem in the information security field. In order to solve the above problem, this article proposes the security defense technology based on Mandatory Running Control, which can solve the unpredictable deadlock problem from the system kernel level, prevent illegal process running and restrict allowed process's behavior, realizing security defense of service operating and ensuring the system running continuously and reliably. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on Mandatory Running Control.
引用
收藏
页码:770 / +
页数:3
相关论文
共 50 条
  • [41] Design and implementation of an integrated technology system for rail shipper safety & security
    Dash, Ishita
    Abkowitz, Mark
    Loftis, Don
    Philip, Craig
    JOURNAL OF RAIL TRANSPORT PLANNING & MANAGEMENT, 2021, 20
  • [42] The Design of Multidimensional Mandatory Access Control Model Based on GIS
    Peng Fang
    Li Li-juan
    Zheng Chi-fang
    Song Tao
    2011 INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND NEURAL COMPUTING (FSNC 2011), VOL V, 2011, : 195 - 198
  • [43] Design and Implementation of Security Camera Control Application for Mobile Phones
    Kato, Takeshi
    Osano, Tomoyuki
    Ishikawa, Norihiro
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 555 - 559
  • [44] The Design of Multidimensional Mandatory Access Control Model Based on GIS
    Peng Fang
    Li Li-juan
    Zheng Cui-fang
    Song Tao
    2011 AASRI CONFERENCE ON APPLIED INFORMATION TECHNOLOGY (AASRI-AIT 2011), VOL 3, 2011, : 195 - 198
  • [45] Research and implementation of network attack and defense countermeasure technology based on artificial intelligence technology
    Shu, Fei
    Chen, ShuTing
    Li, Feng
    Zhang, JianYe
    Chen, Jia
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 475 - 478
  • [46] Design and implementation of home intercom and security control systems for buildings
    Bai, Ying-Wen
    Chen, Shi-Chang
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 229 - 234
  • [47] Design and Implementation of an SMS Based Home Security System
    Choudhury, Biplav
    Choudhury, Tameem S.
    Pramanik, Aniket
    Arif, Wasim
    Mehedi, J.
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
  • [48] The Design and Implementation of Security Network System Based on Web
    Huang Zhikun
    PROCEEDINGS OF 2014 IEEE WORKSHOP ON ADVANCED RESEARCH AND TECHNOLOGY IN INDUSTRY APPLICATIONS (WARTIA), 2014, : 131 - 133
  • [49] Design and implementation of security system based on immune system
    Nishiyama, H
    Mizoguchi, F
    SOFTWARE SECURITY - THEORIES AND SYSTEMS, 2003, 2609 : 234 - 248
  • [50] The design and implementation of router security subsystem based on IPSEC
    Wu, YH
    Wu, JP
    Xu, K
    Xu, MW
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 160 - 165