2010 International Conference on Availability, Reliability and Security 2010
DOI: 10.1109/ares.2010.48
|View full text |Cite
|
Sign up to set email alerts
|

LSM-Based Secure System Monitoring Using Kernel Protection Schemes

Abstract: Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In the case of the Linux kernel 2.6, a set of hook functions called the Linux Security Module (LSM) has been implemented in order to monitor and control the system calls. By using the LSM we can inspect the activity of unknown malicious processes. However, a sophisticated attacker could breach the kernel configurations using the rootkits. F… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…Knowledge of the distribution law makes it possible to estimate possible deviations in the value of damage from its mean value. However, in practice, the distribution law of the damage extent is not usually applied [2][3][4]. Contemporary science has not developed clear algorithms for a priori specification of the distribution law of a random variable.…”
Section: Methodsmentioning
confidence: 99%
“…Knowledge of the distribution law makes it possible to estimate possible deviations in the value of damage from its mean value. However, in practice, the distribution law of the damage extent is not usually applied [2][3][4]. Contemporary science has not developed clear algorithms for a priori specification of the distribution law of a random variable.…”
Section: Methodsmentioning
confidence: 99%
“…An original logging method, independent of syslog, has been proposed for audit [8]. This method uses Linux Security Modules (LSM) to gather the logs, and Mandatory Access Control (MAC) to ensure their validity.…”
Section: Original Logging Methodsmentioning
confidence: 99%
“…This is a scientific method or research technology for court actions, which allows us to explain the validity of the electronic records. Many researchers are working in this area of the protection of logging information [2,4,8,10,11].…”
Section: Introductionmentioning
confidence: 99%
“…LSM is also used in MAC-based malware and rootkit detection solution in [12]. The process information is obtained by using LSM to intercept the system calls which are activated when a process is executed.…”
Section: B Linux Security Modules (Lsm)mentioning
confidence: 99%