Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Safe operation method based on enhanced ROST in Linux

A safe operation and enhanced technology, applied in computer security devices, instruments, digital data authentication, etc., can solve problems such as damage to files or programs, lack of security management control in the system, imperfect security guarantees, etc., to prevent modification or destruction, The effect of reducing cybersecurity risk, improving security and robustness

Inactive Publication Date: 2016-12-14
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security issue of the Linux operating system has been questioned, and it is not obvious when ordinary users use it, but it has become the biggest obstacle when the operating system is widely used by government departments and telecommunications departments.
[0003] The security aspects of the Linux operating system mainly have the following problems: 1) superuser privileges: the superadministrator has too much authority, and it has privileges that other users do not have. ) File access control is simple: users can obtain the right to use system files when they enter the system, and file access is only controlled by setting file access permissions. The system does not have a mandatory security access control mechanism, which opens the door for attackers; 3) Simple program start control: users can start any program (including viruses or Trojan horses) after entering the system. The system has no mandatory program start and execution control mechanism, which brings great security risks to the system; 4) The executed program is not safe: Already running Linux operating system processes or user processes are often rewritten in memory, or even injected with malicious code, which makes the program's behavior deviate from the original track and causes various system failures; 5) System user protection is simple: after many hackers break into the system , the first thing to do is to add a user of your own, so that you can often use this account to patronize in the future. The current system lacks security management control over users, and the risk of system users being added or modified is very high; 6) Lack of disk protection: Now some sophisticated hackers sometimes directly rewrite the data on the disk, thus destroying the system files or programs, causing some unpredictable problems in the system; 7) The network port protection is not perfect: hackers usually find the system through some port scanning tools 8) The user login process is simple: you only need to enter a password to log in to Linux. Once the password is stolen, the door of the operating system will be opened immediately. , the lack of a secondary confirmation mechanism; 9) buffer overflow causes hidden dangers: various business applications are often running on Linux servers, and it is difficult to ensure that the developers of each application program can ensure that the buffer of their own program will not overflow, and once Buffer overflow is exploited by hackers, hackers will do whatever they want
The security guarantee of the current Linux operating system is not perfect, and the system failures that are likely to be caused mainly include the following: (1) Some key files are missing or deleted by mistake, such as boot files; (2) Configuration files are maliciously changed, such as Server ip address, etc.; (3) Load malicious driver; (4) Key operating system files are modified or replaced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0016] A kind of enhanced ROST-based safe operation method under Linux described in this embodiment enhances the security of the original operating system by adding a kernel module on the Linux operating system, and the kernel module includes: a file mandatory access control module, a program A startup and execution control module, a process mandatory access control module, a network port mandatory access control module, a user protection control module, a disk protection control module, a login protection control module and an overflow protection control module.

[0017] In the enhanced ROST-based safe operation method under Linux described in this embodiment, the file mandatory access control module is responsible for user-based access control to files and process-based access control to files;

[0018] When the file system filter driver of the file mandatory access control module is initialized, the access rules are inserted into the access control list one by one, and the a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safe operation method based on an enhanced ROST in a Linux, and relates to the field of computer systems and information security. Permission access of an operation system is reconstructed in a core layer of the Linux operation system, and a kernel module is added into the Linux operation system through a mandatory access control technique, and in this way, access safe limit of the system can be achieved, and the safety of the original Linux operation system can be improved. The kernel module includes a file mandatory access control module, a program start and execution control module, a process mandatory access control module, a network port mandatory access control module, a user protection control module, a disk protection control module, a log-in protection control module and an overflow protection control module.

Description

technical field [0001] The invention relates to the field of computer system and information security, in particular to an enhanced ROST-based safe operation method under Linux. Background technique [0002] Linux is a multi-user, multi-task, multi-thread and multi-CPU operating system based on POSIX and UNIX. It can run major UNIX tool software, application programs and network protocols, and supports 32-bit and 64-bit hardware. The Linux operating system is used more and more widely, and its stable and efficient features have been widely welcomed. However, the security issue of the Linux operating system has been questioned, and it is not obvious when ordinary users use it, but it has become the biggest obstacle when the operating system is widely used by government departments and telecommunications departments. [0003] The security aspects of the Linux operating system mainly have the following problems: 1) superuser privileges: the superadministrator has too much aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/80G06F21/31G06F21/34G06F21/51G06F21/52
CPCG06F21/604G06F21/31G06F21/34G06F21/51G06F21/52G06F21/6218G06F21/80G06F2221/2141
Inventor 邢希双
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products