簡易檢索 / 詳目顯示

研究生: 莊雲凱
Chuang, Yun-Kai
論文名稱: 智慧使用者行為分析機制於Linux Security Module
Intelligent Mechanism for User Behavior Analysis in Linux Security Module
指導教授: 鄭憲宗
Cheng, Sheng-Tzong
學位類別: 碩士
Master
系所名稱: 電機資訊學院 - 資訊工程學系
Department of Computer Science and Information Engineering
論文出版年: 2019
畢業學年度: 107
語文別: 英文
論文頁數: 26
中文關鍵詞: Linux Security Module網路安全作業系統安全使用者行為分析
外文關鍵詞: Linux Security Module, network security, operating system security, user behavior analyze
相關次數: 點閱:79下載:0
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 隨著電腦網路的高速發展,越來越多的設備都具備聯網功能,尤其是在不久的5G網路,強調更大的頻寬,以及覆蓋更多的IOT設備。越來越多的聯網設備,也讓網路安全領域在近幾年受到高度的重視。
    傳統的網路安全大多強調於事情發生之前以及事情發生之中的防禦,舉例來說:人員的教育訓練、事先設定好的安全規則設定屬於事情發生之前的防禦,分析當下傳輸到電腦裡的封包並進行相對應的對策屬於事中的防禦,但是鮮少有人提到:當駭客已經突破重重關卡拿到了電腦使用者的權限要怎麼進行防禦,也就是所謂的事後防禦。
    在本研究當中,我將聚焦於敏感資料的保護,並且在Linux作業系統裡提出一個新的安全架構,除了前段所提及的事後防禦之外,我們還加入了使用者行為分析,讓事後防禦的效果更加智慧且安全。

    With the rapid growth of computer networking, more and more devices have the ability to connect to network. Especially fifth generation network emphasis the bigger bandwidth and covers more IOT device. Because of the large amount of networking devices in the network environment, the network security plays the important role recent year.
    Traditional network security mostly emphasizes the defense before and during the attacking event. For example, personal training and preset security rule in computer are the defenses before the attacking event. Analyzing the packets that are currently transmitted to the computer and perform corresponding countermeasures is the defense during the attacking event. But few people mentioned that when the hacker break through the line of defense and got the permission of victim’s computer, that is, so-called the defense after the attacking event.
    In this research, I will focus on the protection of sensitive data and propose a new security architecture in Linux operating system, In addition to the defense after the attacking event, we also add user behavior analysis to our system in order to make defense more security and intelligent.

    摘要 I Abstract II Acknowledgment III Table of Contents IV List of Tables V List of Figures VI Chapter 1. Introduction 1 1.1 Introduction and Motivation 1 Chapter 2. Background and Related Work 3 2.1 Access Control List (ACL) 3 2.2 Network socket 4 2.3 Linux Security Module (LSM) 6 2.4 Hierarchical Clustering Algorithms (Agglomerative method) 9 2.5 Deep and Cross Network 10 2.6 Fanotify 12 Chapter 3. System design and Implementation 13 3.1 System Architecture 13 3.2 File operation defender 15 3.3 Network operation defender 17 3.4 Vertebral filesystem and Vertebral library 18 3.5 Cerebrum daemon 18 3.5.1 Login anomaly detection 18 3.5.2 File access anomaly detection 21 Chapter 4. Experiment and Results 22 4.1 Experimental Setup 22 4.2 Experimental Results 22 4.2.1 User login analyze 22 4.2.2 File access analyze 24 Chapter 5. Conclusions and Future Work 25 5.1 Conclusions 25 5.2 Future Work 25 References 26

    [1] S. Mohurle and M. Patil, "A brief study of wannacry threat: Ransomware attack 2017," International Journal of Advanced Research in Computer Science, vol. 8, no. 5, 2017.
    [2] D. Wichers, "Owasp top-10 2013," OWASP Foundation, February, 2013.
    [3] C. Runge, "SELinux: A new approach to secure systems," computing, 2004.
    [4] M. Kerrisk, The Linux programming interface: a Linux and UNIX system programming handbook. No Starch Press, 2010.
    [5] S. Smalley, C. Vance, and W. Salamon, "Implementing SELinux as a Linux security module," NAI Labs Report, vol. 1, no. 43, p. 139, 2001.
    [6] C. Wright, C. Cowan, J. Morris, S. Smalley, and G. Kroah-Hartman, "Linux security module framework," in Ottawa Linux Symposium, 2002, vol. 8032, pp. 6-16.
    [7] R. Xu and D. C. Wunsch, "Survey of clustering algorithms," 2005.
    [8] H.-T. Cheng et al., "Wide & deep learning for recommender systems," in Proceedings of the 1st workshop on deep learning for recommender systems, 2016: ACM, pp. 7-10.
    [9] R. Wang, B. Fu, G. Fu, and M. Wang, "Deep & cross network for ad click predictions," in Proceedings of the ADKDD'17, 2017: ACM, p. 12.
    [10] P. Mochel, "The sysfs filesystem," in Linux Symposium, 2005, p. 313.

    無法下載圖示 校內:2024-08-31公開
    校外:不公開
    電子論文尚未授權公開,紙本請查館藏目錄
    QR CODE