Control of the gateway security configuration policy

Author(s):  
Zha Wei
2004 ◽  
pp. 115-193
Author(s):  
Chun Hai (Bernard) Cheah ◽  
Ken Schaefer ◽  
Chris Peiris

2021 ◽  
pp. 573-591
Author(s):  
Egbert Jahn ◽  
Pierre Lemaitre ◽  
Ole Waever

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Yan Ding ◽  
Pan Dong ◽  
Zhipeng Li ◽  
Yusong Tan ◽  
Chenlin Huang ◽  
...  

The root privilege escalation attack is extremely destructive to the security of the Android system. SEAndroid implements mandatory access control to the system through the SELinux security policy at the kernel mode, making the general root privilege escalation attacks unenforceable. However, malicious attackers can exploit the Linux kernel vulnerability of privilege escalation to modify the SELinux security labels of the process arbitrarily to obtain the desired permissions and undermine system security. Therefore, investigating the protection method of the security labels in the SELinux kernel is urgent. And the impact on the existing security configuration of the system must also be reduced. This paper proposes an optimization scheme of the SELinux mechanism based on security label randomization to solve the aforementioned problem. At the system runtime, the system randomizes the mapping of the security labels inside and outside the kernel to protect the privileged security labels of the system from illegal obtainment and tampering by attackers. This method is transparent to users; therefore, users do not need to modify the existing system security configuration. A tamper-proof detection method of SELinux security label is also proposed to further improve the security of the method. It detects and corrects the malicious tampering behaviors of the security label in the critical process of the system timely. The above methods are implemented in the Linux system, and the effectiveness of security defense is proven through theoretical analysis and experimental verification. Numerous experiments show that the effect of this method on system performance is less than 1%, and the success probability of root privilege escalation attack is less than 10−9.


2019 ◽  
Vol 23 (11) ◽  
pp. 2130-2134 ◽  
Author(s):  
Bomin Mao ◽  
Yuichi Kawamoto ◽  
Jiajia Liu ◽  
Nei Kato

2013 ◽  
Vol 347-350 ◽  
pp. 1846-1851
Author(s):  
Zhi Yong Lu ◽  
Yi Jun Zhang ◽  
Luan Yang ◽  
Shi Ping Xu ◽  
Yuan You Chen

This article analyzes the accidents of power grid in some domestic region to discuss the security problems existing in the power grid Energy Management Systems (EMS). Combined with the security requirements of EMS, the method of improving EMS security based on SOA is proposed and the involving key technologies are studied as follows: the loosely coupled EMS based on SOA, the graded and modularity security configuration, the management of security configuration based on Concurrent Version System (CVS) and the mirror of Real-Time Databases (RTD) based on cloud computing. All the above technologies proposed in this paper greatly improve the security of EMS.


Sign in / Sign up

Export Citation Format

Share Document