Full metadata record
DC FieldValueLanguage
dc.contributorMulti-disciplinary Studiesen_US
dc.creatorLeung, Lap-yin-
dc.identifier.urihttps://theses.lib.polyu.edu.hk/handle/200/2504-
dc.languageEnglishen_US
dc.publisherHong Kong Polytechnic University-
dc.rightsAll rights reserveden_US
dc.titleUNIX security checking tool using knowledge-based approachen_US
dcterms.abstractIn the past two decades, UNIX operating system has gained its popularity and connectivity rapidly. This growth attracts not only many new users, but also, intruders and abusers. There have been some major security events happened over the past decade [1, 9], and they raised the public awareness of the UNIX security issues. There are quite a number of security tools that help the security administrator check and maintain UNIX security in different aspects, such as, security loopholes, password checker, and packet monitoring. However, the growing complexity of UNIX security issues has increased the workload of many system administrators tremendously. Even worse, the resolution of these issues often demands special expertise and experience from the administrators. To address the above problems, this project proposes to use knowledge-based approaches to develop a host-based security checking system. This system contains two sub-systems -- A rule-based sub-system with a set of UNIX security rules and a set of system probes to facilitate the security hole checking in the operating system; and a case-based sub-system that maintains the previous cases of security events to help system administrators solve the problem situations and facilitates the re-use and the sharing of experience among the administrators. A prototype of the system has been implemented to demonstrate how the collaboration of the two sub-systems with different approaches can assist system administrators in overcoming the ever-growing challenge of UNIX security problems.en_US
dcterms.extent[7], 121 leaves : ill. ; 30 cmen_US
dcterms.isPartOfPolyU Electronic Thesesen_US
dcterms.issued1998en_US
dcterms.educationalLevelAll Masteren_US
dcterms.educationalLevelM.Sc.en_US
dcterms.LCSHUNIX (Computer file)en_US
dcterms.LCSHComputer securityen_US
dcterms.LCSHOperating systems (Computers)en_US
dcterms.LCSHHong Kong Polytechnic University -- Dissertationsen_US
dcterms.accessRightsrestricted accessen_US

Files in This Item:
File Description SizeFormat 
b14369291.pdfFor All Users (off-campus access for PolyU Staff & Students only)3.28 MBAdobe PDFView/Open


Copyright Undertaking

As a bona fide Library user, I declare that:

  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.

By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

Show simple item record

Please use this identifier to cite or link to this item: https://theses.lib.polyu.edu.hk/handle/200/2504