DocumentCode :
3059381
Title :
Policy Specification and Enforcement for Detection of Security Violations in a Mail Service
Author :
Rao, A. Murali M
Author_Institution :
Univ. of Hyderabad, Hyderabad
fYear :
2006
fDate :
18-21 Dec. 2006
Firstpage :
172
Lastpage :
175
Abstract :
The paper presents a policy-based approach to detect security violations by enforcing security policy at run-time for providing secure email service. As email service usage is increasing day by day, hackers or attackers are also playing a vital role to destruct email service and even to crash the email server. Due to this, it is a challenging task today to the system administrators to provide secure email service. In this paper, security policy is defined at operating system level, mail application level and network infrastructure level. A policy at system level specifies mandatory usage profile, usages of system sensitive resources such as file system objects, processes, system memory and inter process communication objects. Policies for mail application are defined with sensitive files/directories and parameters, which have impact in delivering a service. Policies for network are defined for controlling inbound and outbound traffic, specifying demilitarized zone, denying misuse of public IP and detecting suspicious network activity. The proposed system architecture supports the layered approach in policy enforcement, proactive defensive mechanism against security violations and scope for new policy discovery. The approach is prototyped on Linux-2.4.21-4 and have built rules for squirrel mail version 1.4.5 to detect security violations in a mail service at run-time.
Keywords :
IP networks; computer crime; electronic mail; demilitarized zone; file system objects; inter process communication objects; mail application level; mandatory usage profile; network infrastructure; operating system; policy enforcement; policy specification; public IP; secure email service; security policy; security violations; squirrel mail version 1.4.5; suspicious network activity; system memory; Communication system security; Communication system traffic control; Computer crashes; Computer hacking; File systems; Network servers; Operating systems; Postal services; Prototypes; Runtime;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Technology, 2006. ICIT '06. 9th International Conference on
Conference_Location :
Bhubaneswar
Print_ISBN :
0-7695-2635-7
Type :
conf
DOI :
10.1109/ICIT.2006.72
Filename :
4273182
Link To Document :
بازگشت