Until the availability of Kernel 2.6 the Linux op-erating system lacked general support to integrate security mechanisms into the kernel. The Linux Se-curity Module Framework (LSM) was designed to overcome this limitation. Although LSM provides a solid baseline for kernel security, it lacks impor-tant features. In this paper two of these limitations are addressed: First a framework-managed module stacking mechanism is proposed that allows multi-ple security policies to be present in the kernel at the same time. The second aspect this paper deals with is the addition of LSM hooks to the Linux TCP layer. This extension was chosen because it allows the implementation of a State-Based Network In-trusion Detection Mechanism which is outlined at ...
Abstract—Kernel-level keyloggers, which are installed as part of the operating system (OS) with comp...
The economy of mechanism security principle states that program design should be kept as small and s...
The security of Linux depends on many configuration file both at system level and application level....
Until the availability of Kernel 2.6 the Linux op-erating system lacked general support to integrate...
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly en...
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly en...
The access control mechanisms of existing mainstream operating systems are inadequate to provide str...
In this paper, we present an approach, sup-ported by software tools, for maintaining the correctness...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
Abstract—Monitoring a process and its file I/O behaviors is important for security inspection for a ...
An enhancement to TCP (Transmission Control Protocol) is proposed to give additional security betwee...
The purpose of this final year project was to study the Linux security mechanism. The aim was to lea...
Operating systems traditionally bring their own means of protection against any kind of threats. But...
Designing a secured network is the most important task in any enterprise or organization development...
One of the central building blocks of cloud platforms are linux containers which simplify the deploy...
Abstract—Kernel-level keyloggers, which are installed as part of the operating system (OS) with comp...
The economy of mechanism security principle states that program design should be kept as small and s...
The security of Linux depends on many configuration file both at system level and application level....
Until the availability of Kernel 2.6 the Linux op-erating system lacked general support to integrate...
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly en...
Computer security is a chronic and growing problem, even for Linux, as evidenced by the seemingly en...
The access control mechanisms of existing mainstream operating systems are inadequate to provide str...
In this paper, we present an approach, sup-ported by software tools, for maintaining the correctness...
Security is a problem of trust. Having a system that offers services to Internet and that can be tru...
Abstract—Monitoring a process and its file I/O behaviors is important for security inspection for a ...
An enhancement to TCP (Transmission Control Protocol) is proposed to give additional security betwee...
The purpose of this final year project was to study the Linux security mechanism. The aim was to lea...
Operating systems traditionally bring their own means of protection against any kind of threats. But...
Designing a secured network is the most important task in any enterprise or organization development...
One of the central building blocks of cloud platforms are linux containers which simplify the deploy...
Abstract—Kernel-level keyloggers, which are installed as part of the operating system (OS) with comp...
The economy of mechanism security principle states that program design should be kept as small and s...
The security of Linux depends on many configuration file both at system level and application level....