By Topic

The Design and Implementation of Security Defense Technology Based on Mandatory Running Control

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Liu Jizhen ; Dept. of Autom. Control, North China Electr. Power Univ., Beijing, China ; Wu Kehe ; Zhang Tong ; Ma Gang

In the multi-processed and multi-threaded complex network environment, application system will appear the unforeseen deadlock problem. This deadlock problem may cause service interruption, and even can cause the crash of the application system. On the other hand, malicious attacks on the system and other random events will also cause serious consequences. The security defense of service operating has become another important problem in the information security field. In order to solve the above problem, this article proposes the security defense technology based on mandatory running control, which can solve the unpredictable deadlock problem from the system kernel level, prevent illegal process running and restrict allowed processpsilas behavior, realizing security defense of service operating and ensuring the system running continuously and reliably. This paper introduces the principle, theoretical model and the technologies in the implementation of the security defense technology based on mandatory running control.

Published in:

Information Assurance and Security, 2009. IAS '09. Fifth International Conference on  (Volume:1 )

Date of Conference:

18-20 Aug. 2009