Title :
LSM-Based Secure System Monitoring Using Kernel Protection Schemes
Author :
Isohara, Takamasa ; Takemori, Keisuke ; Miyake, Yutaka ; Qu, Ning ; Perrig, Adrian
Author_Institution :
KDDI R&D Labs., Saitama, Japan
Abstract :
Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In the case of the Linux kernel 2.6, a set of hook functions called the Linux Security Module (LSM) has been implemented in order to monitor and control the system calls. By using the LSM we can inspect the activity of unknown malicious processes. However, a sophisticated attacker could breach the kernel configurations using the rootkits. Furthermore since the monitoring results of the malicious process activity are stored as a file on Hard Disk Drive (HDD), it will be easily manipulated by the attacker. In this paper, we propose a secure monitoring scheme that addresses the attacks against the monitoring module and its result for security inspection of the data center server. The monitoring module is implemented as a LSM-based function and protected by the kernel protection technique. The integrity of the monitoring result is guaranteed by using a Mandatory Access Control (MAC) of the Linux kernel and a mechanism of the trusted process invocation. This mechanism can serve as an infrastrucuture of secure inspection platform for data center server because the integrity of the monitoring module and its result is guaranteed.
Keywords :
Linux; invasive software; operating system kernels; LSM-based secure system monitoring; Linux kernel 2.6; Linux security module; data center server; hook functions; information leakage; intrusions; kernel protection schemes; malicious process activity; malware infection; mandatory access control; monitoring module; rootkits; security inspection; trusted process invocation; Control systems; Data security; File servers; Hard disks; Information security; Inspection; Kernel; Linux; Monitoring; Protection; Lifetime kernel code integrity; Linux Security Module; Mandatory Access Control; Secure system monitoring;
Conference_Titel :
Availability, Reliability, and Security, 2010. ARES '10 International Conference on
Conference_Location :
Krakow
Print_ISBN :
978-1-4244-5879-0
DOI :
10.1109/ARES.2010.48