UNIX security checking tool using knowledge-based approach

Pao Yue-kong Library Electronic Theses Database

UNIX security checking tool using knowledge-based approach

 

Author: Leung, Lap-yin
Title: UNIX security checking tool using knowledge-based approach
Degree: M.Sc.
Year: 1998
Subject: UNIX (Computer file)
Computer security
Operating systems (Computers)
Hong Kong Polytechnic University -- Dissertations
Department: Multi-disciplinary Studies
Pages: [7], 121 leaves : ill. ; 30 cm
Language: English
InnoPac Record: http://library.polyu.edu.hk/record=b1436929
URI: http://theses.lib.polyu.edu.hk/handle/200/2504
Abstract: In the past two decades, UNIX operating system has gained its popularity and connectivity rapidly. This growth attracts not only many new users, but also, intruders and abusers. There have been some major security events happened over the past decade [1, 9], and they raised the public awareness of the UNIX security issues. There are quite a number of security tools that help the security administrator check and maintain UNIX security in different aspects, such as, security loopholes, password checker, and packet monitoring. However, the growing complexity of UNIX security issues has increased the workload of many system administrators tremendously. Even worse, the resolution of these issues often demands special expertise and experience from the administrators. To address the above problems, this project proposes to use knowledge-based approaches to develop a host-based security checking system. This system contains two sub-systems -- A rule-based sub-system with a set of UNIX security rules and a set of system probes to facilitate the security hole checking in the operating system; and a case-based sub-system that maintains the previous cases of security events to help system administrators solve the problem situations and facilitates the re-use and the sharing of experience among the administrators. A prototype of the system has been implemented to demonstrate how the collaboration of the two sub-systems with different approaches can assist system administrators in overcoming the ever-growing challenge of UNIX security problems.

Files in this item

Files Size Format
b14369291.pdf 3.358Mb PDF
Copyright Undertaking
As a bona fide Library user, I declare that:
  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

     

Quick Search

Browse

More Information