会议论文详细信息
2nd International conference on Advances in Mechanical Engineering
Next generation system security measures based on the process behaviour and permissions in Linux
Jayaprakash, D.^1 ; Meeran, Nagoor^1
SRM Institute of Science and Technology, Chennai, India^1
关键词: Access permissions;    Malicious activities;    Next generation systems;    Process descriptions;    Security chain;    Security professionals;    System security;    Weakest links;   
Others  :  https://iopscience.iop.org/article/10.1088/1757-899X/402/1/012062/pdf
DOI  :  10.1088/1757-899X/402/1/012062
来源: IOP
PDF
【 摘 要 】

Threats are increasing day by day all over the world so information assert is at major risk. Security can be provided with the help of security professionals by using various tools, software and techniques etc., but the weakest link in the security chain is END USER. So it's essential to ensure that end user is aware of threats. If end user is aware of what is going on in his/her PC then most of the security related issues can be solved. The newly built application in this project, is user-friendly and user can easily navigate through the application since all these information will be in plain English and in GUI format. The objective of this project is to do behavioural analysis of the processes to create awareness to the end users about the processes running in the system is a legitimate process or not. The processes running on the Linux system will be running on behalf of the user who executes it. So, the process will be having the access permission as same as the user who executes it i.e., the process can access the file with what user is allowed to do. So in order to know the process permission of the file, we need to integrate user permission of the file and processes those are running under that user along with process description. Apparently, some processes are legitimate to access the file but it's not. So, we need to trace the process behaviour and if the behaviour doesn't seem to be legitimate then by stating the behavioural activity of the process & its malicious activities, we have to suggest the user to take necessary action towards it. Also, there are more additional features included such as end user can kill non-legitimate processes or uninstall the application which runs those malicious processes. If these two features fail to work then user can contact any System Security professionals. This proposal is comparatively unique since it will create awareness for end user to secure his/her privacy. If this idea is implemented in all the systems then it can possibly enrich the knowledge of the end user to secure his/her private asserts in his/her system.

【 预 览 】
附件列表
Files Size Format View
Next generation system security measures based on the process behaviour and permissions in Linux 1092KB PDF download
  文献评价指标  
  下载次数:9次 浏览次数:17次