International Journal of Engineering in Computer Science

P-ISSN: 2663-3582, E-ISSN: 2663-3590
Printed Journal   |   Refereed Journal   |   Peer Reviewed Journal

2021, Vol. 3, Issue 1, Part A

Suspicious-taint-based access control for protecting OS from network attacks


Author(s): Zhiyong Shan

Abstract: Today, security threats to operating systems largely come from network. Traditional discretionary access control mechanism alone can hardly defeat them. Although traditional mandatory access control models can effectively protect the security of OS, they have problems of being incompatible with application software and complex in administration. In this paper, we propose a new model, Suspicious-Taint-Based Access Control (STBAC) model, for defeating network attacks while being compatible, simple and maintaining good system performance. STBAC regards the processes using Non-Trustable-Communications as the starting points of suspicious taint, traces the activities of the suspiciously tainted processes by taint rules, and forbids the suspiciously tainted processes to illegally access vital resources by protection rules. Even in the cases when some privileged processes are subverted, STBAC can still protect vital resources from being compromised by the intruder. We implemented the model in the Linux kernel and evaluated it through experiments. The evaluation showed that STBAC could protect vital resources effectively without significant impact on compatibility and performance.

DOI: 10.33545/26633582.2021.v3.i1a.43

Pages: 19-30 | Views: 714 | Downloads: 344

Download Full Article: Click Here
How to cite this article:
Zhiyong Shan. Suspicious-taint-based access control for protecting OS from network attacks. Int J Eng Comput Sci 2021;3(1):19-30. DOI: 10.33545/26633582.2021.v3.i1a.43
International Journal of Engineering in Computer Science

International Journal of Engineering in Computer Science

International Journal of Engineering in Computer Science
Call for book chapter