首页> 外文学位 >A multi-agent architecture for information leakage detection in distributed systems.
【24h】

A multi-agent architecture for information leakage detection in distributed systems.

机译:用于分布式系统中信息泄漏检测的多代理体系结构。

获取原文
获取原文并翻译 | 示例

摘要

Covert channel attacks utilize shared resources to indirectly transmit sensitive information to unauthorized parties. Many current operating systems, such as SELinux, rely on generating labels based on a file's security classification and system-wide security policies and then binding these labels to all such files in the filesystem. Enforcement of security policies in such systems occurs at the time of access to a file or resource. Such mechanisms are flawed, however, in that they do not adequately protect against information laundering by means of covert channels. One recent development, Colored Linux, serves as an extension to SELinux and utilizes watermarking algorithms to "color" the contents of files with their respective security classification in order to enhance resistance to information laundering attacks. In this thesis, a mobile agent-based approach to implementing Colored Linux is proposed to automate the process of detecting and coloring receptive hosts' filesystems and to provide monitoring of the colored filesystem for instances of potential information leakage. Implementation details and execution results are included to illustrate the merits of the proposed approach. An evaluation of the performance of this agent-based system is conducted over a single host as well as a local network of machines and detailed here as well. Finally, third-party analysis of the agent system using formal methods is discussed.
机译:秘密通道攻击利用共享资源将敏感信息间接传输给未授权方。当前的许多操作系统(例如SELinux)都依赖于基于文件的安全性分类和系统范围的安全性策略生成标签,然后将这些标签绑定到文件系统中的所有此类文件。在访问文件或资源时,会在此类系统中实施安全策略。但是,这样的机制有缺陷,因为它们不能充分地防止通过秘密渠道进行的信息清洗。一项最新的开发成果,即Colored Linux,是SELinux的扩展,并利用水印算法对文件内容及其各自的安全性分类进行“着色”,以增强对信息清洗攻击的抵抗力。在本文中,提出了一种基于移动代理的实现彩色Linux的方法,以自动化检测和着色接收主机文件系统的过程,并为彩色文件系统的潜在信息泄漏实例提供监视。包括实现细节和执行结果,以说明所提出方法的优点。基于代理的系统的性能评估是在单个主机以及本地计算机网络上进行的,在此也进行了详细介绍。最后,讨论了使用形式化方法对代理系统进行第三方分析。

著录项

  • 作者

    Bishop, Stephen.;

  • 作者单位

    Southern Illinois University at Carbondale.;

  • 授予单位 Southern Illinois University at Carbondale.;
  • 学科 Computer Science.
  • 学位 M.S.
  • 年度 2009
  • 页码 68 p.
  • 总页数 68
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号