Font Size: a A A

Research And Development Of The High Level Of Security Audit System

Posted on:2006-07-21Degree:MasterType:Thesis
Country:ChinaCandidate:F L WangFull Text:PDF
GTID:2208360152487494Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
With the development of the computer science, the security of the computer system becomes more and more important. The secure operating system is the key to build robust computer systems. To some extent, the security of OS is dependent on the secure auditing system.This project is one module of the ANSHENG OS 4.0, which obtained the following achievements.First, based on the Linux Security Modules(LSM), an extended Linux Security Modules was founded. With the extended LSM, a secure auditing system was designed and implemented which met the needs of B2 level of TCSEC. The secure auditing system can monitor and log 97 audit events, maximized the security of the ANSHENG OS 4.0.Second, in our ANSHENG OS 4.0, 18 covert channels have been found. And the secure auditing system introduced a covert channel alarm center to detect the covert channel activities and give the alarm.Third, according to the implementation of ANSHENG OS 4.0, some researches on key techniques of auditing system have been done. Now the secure auditing system can filter the auditing records in many ways. The role of the auditor in POSIX has been divided into 2 parts, one is the operator of audit, and the other is the administrator of audit. To get a better protection, the configuration profiles of auditing system and the audit logs have been guarded by the OS' security policies.Last, based on the current secure auditing system, the networking auditing system has been studied, in order to support better fault tolerance and computer forensics. After introducing a networking auditing system model, some design and implementation techniques has been discussed.In summary, this project has carried a lot of researches on the key techniques of secure auditing system. And the achievements obtained will be great helpful to the future research on the secure auditing system of higher secure level.
Keywords/Search Tags:secure auditing system, Linux Security Modules, covert channel, networking auditing system
PDF Full Text Request
Related items