期刊文献+

一种基于并发冲突间隔时间的隐蔽信道检测方法 被引量:2

Detecion Approach for Covert Channel Based on Concurrency Conflict Interval Time
在线阅读 下载PDF
导出
摘要 采用多级安全策略的信息系统中,事务的并发冲突会导致数据冲突隐蔽信道.现有的隐蔽信道检测方法存在以下问题:1)分析角度单一,入侵者可以通过分散记录的方式逃避检测;2)使用单一的检测指标,存在一定的误判和漏判.提出了一种基于冲突间隔时间的隐蔽信道检测方法CTIBDA.该方法解决了以上问题:1)从主体和客体2种角度对冲突记录进行划分,以防止入侵者通过分散冲突记录的方式逃避检测;2)使用冲突间隔时间分布和冲突间隔时间序列2种规律性特征指标作为检测依据.实验结果证实,该方法能够降低检测结果的误报率和漏报率,提高准确率.同时该方法结构简单适合在线实施,对于其他的并发冲突隐蔽信道场景具有普遍的适用性. Concurrency conflicts may bring data conflict covert channcl in multi level secure systems. The existing covert channel detection methods have the following flaws: 1) Analyzing conflict records with single point, so the invaders can evade to be detected; 2) Using single indicator will bring false positive and false negative. We present a detection method based on conflict interval time called CTIBDA in this paper. This method solves the above problems: 1) Analyzing the conflict records with subject and object can prevent intruders from dispersing; 2) Using both the distribution and the sequence of intervals between transactions conflicts as indicators. The experimental results show that this approach can reduce the false positive and false negative and increase the accuracy. CTIBDA is suitable for online implementation and can be universally applied to concurrency conflict covert channels in other scenarios.
出处 《计算机研究与发展》 EI CSCD 北大核心 2011年第8期1542-1553,共12页 Journal of Computer Research and Development
基金 中国科学院软件研究所重大项目"网络算法与数字信息"(YOCX285056) 中国科学院知识创新工程重要方向项目(KGCX2-YW-125) "核高基"国家科技重大专项(2009ZX01036-001-002)
关键词 多级安全 并发控制 隐蔽信道 时间隐蔽信道 隐蔽信道检测 multi level secure concurrency control covert channel covert timing channel covertchannel detection
  • 相关文献

参考文献33

  • 1王永吉,吴敬征,曾海涛,丁丽萍,廖晓锋.隐蔽信道研究[J].软件学报,2010,21(9):2262-2288. 被引量:48
  • 2卿斯汉,沈昌祥.高等级安全操作系统的设计[J].中国科学(E辑),2007,37(2):238-253. 被引量:16
  • 3卿斯汉.高安全等级安全操作系统的隐蔽通道分析[J].软件学报,2004,15(12):1837-1849. 被引量:32
  • 4Zander S, Armitage G, Branch P. A survey of covert channels and countermeasures in computer network protocols [J]. Communications Surveys &Tutorials, 2007, 9(3):44- 57.
  • 5Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: Exploring information leakage in third party compute clouds [C] //Proc of CCS'09. New York: ACM, 2009, 199-212.
  • 6Wu Jingzheng, Wang Wongji, Ding Liping, et al. Identification and evaluation of sharing memory covert timing channel in Xen virtual machines [C] //Proe of CLOUD 2011. I.os Alamitos, CA: IEEE Computer Society, 2011:283-291.
  • 7Aviram A, Hu S, Ford B, et al. Determinating timing channels in compute clouds [C] //Proc of CCSW'10. New York: ACM, 2010:103-108.
  • 8NCSC. Trusted Computer System Evaluation Criteria [S]. Fort Meade: National Security Agency (NSA), 1985.
  • 9ISO/IEC. Common Criteria for Information Technology Security Evaluation [S]. Switzerland: ISO, 2005.
  • 10中国国家标准化管理委员会.信息安全技术操作系统安全技术要求[S].北京:中国标准出版社,2006.

二级参考文献69

共引文献106

同被引文献51

  • 1卿斯汉,朱继锋.安胜安全操作系统的隐蔽通道分析[J].软件学报,2004,15(9):1385-1392. 被引量:19
  • 2GB/T20009—2005,信息安全技术,数据库管理系统安全评估准则[S].2005.
  • 3吴敬征,丁丽萍,王永吉.云计算环境下隐蔽信道关键问题研究[J].通信学报,2011,32(9A):184-203.
  • 4Lampson B W. A Note on the confinement problem [ J ]. Communications of the ACM, 1973, 16 (10) : 613-615.
  • 5Tsai C R, Gligor V, Chandersekaran C. A formal method for the identification of covert storage channels in source code [ J]. IEEE Transactions of Software Engineering, 1990, 16 (6) : 569-580.
  • 6CCMB- 2009- 07- 001. Common criteria for information technology security evaluation, Part 1: introduction and general model, version 3. 1 [ S ]. 2009.
  • 7GB/T18336.1-2008.信息技术安全技术信息技术安全性评估准则[S].2008.
  • 8Ristenpart T, Tromer E, Shacham H, et al. Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds [ C ] // Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09). ACM, New York, USA, 2009:199-212.
  • 9Thomas J A, Cuppens-Boulahia N, Cuppens F. Expression and enforcement of confidentiality policy in active databases [ C ]// Proceedings of the International Conference on Management of Emergent Digital EcoSystems (MEDES '10). ACM, New York, USA, 2010:289-296.
  • 10Schlegel R, Zhang K, Zhou X, et al. Soundcomber: A stealthy and context-aware sound trojan for smartphones [ C ] // 18th Annual Network and Distributed System Security Conference ( NDSS '11 ). California,USA, 2011 : 17-33.

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部