Design and Implementation MAC in Security Operating System CAI Yi, ZHENG Zhi-rong, SHEN Chang-xiang Presented By, Venkateshwarlu Jangili. 1.

Slides:



Advertisements
Similar presentations
11 World-Leading Research with Real-World Impact! A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders Khalid Zaman Bijon, Tahmina.
Advertisements

Information Flow and Covert Channels November, 2006.
Operating System Security
Lecture 8 Access Control (cont)
Special systems: MLS Multilevel security [“Red book” US-DOD 1987] Considers the assurance risk when composing multilevel secure systems evaluated under.
Vinay Kumar Madhadi 10/28/2009 CSC Outline  Part 1 : Mandatory Flow Control Models? MAC vs. DAC Information Flow Control  Part 2 : Different Models-Lattice.
Chapter 6 Security Kernels.
Secure Operating Systems Lesson 10: SCOMP. Where are we?  Multics is busy being explored, which is kind of cool…  But Multics wasn’t the end of custom.
Access Control Intro, DAC and MAC System Security.
Fundamentals of Computer Security Geetika Sharma Fall 2008.
Chapter 1 Introduction. Chapter Overview Overview of Operating Systems Secure Operating Systems Basic Concepts in Information Security Design of a Secure.
Chapter 2 Access Control Fundamentals. Chapter Overview Protection Systems Mandatory Protection Systems Reference Monitors Definition of a Secure Operating.
Information Systems Security Security Architecture Domain #5.
User Domain Policies.
Mandatory Flow Control Bismita Srichandan. Outline Mandatory Flow Control Models Information Flow Control Lattice Model Multilevel Models –The Bell-LaPadula.
Lecture 7 Access Control
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 4 “Overview”.
CH14 – Protection / Security. Basics Potential Violations – Unauthorized release, modification, DoS External vs Internal Security Policy vs Mechanism.
© G. Dhillon, IS Department Virginia Commonwealth University Principles of IS Security Formal Models.
3/16/2004Biba Model1 Biba Integrity Model Presented by: Nathan Balon Ishraq Thabet.
1 A pattern language for security models Eduardo B. Fernandez and Rouyi Pan Presented by Liping Cai 03/15/2006.
Chapter 5 – Designing Trusted Operating Systems  What makes an operating system “secure”? Or “trustworthy?  How are trusted systems designed, and which.
Three fundamental concepts in computer security: Reference Monitors: An access control concept that refers to an abstract machine that mediates all accesses.
Session 2 - Security Models and Architecture. 2 Overview Basic concepts The Models –Bell-LaPadula (BLP) –Biba –Clark-Wilson –Chinese Wall Systems Evaluation.
Security Architecture and Design Chapter 4 Part 3 Pages 357 to 377.
Security+ All-In-One Edition Chapter 19 – Privilege Management Brian E. Brzezicki.
Lattice-Based Access Control Models Ravi S. Sandhu Colorado State University CS 681 Spring 2005 John Tesch.
Chapter 5 Network Security
Secure Operating System. Mandatory Protection Systems Problem of discretionary access control: untrusted processes can modify protection states Mandatory.
G53SEC 1 Reference Monitors Enforcement of Access Control.
CS426Fall 2010/Lecture 251 Computer Security CS 426 Lecture 25 Integrity Protection: Biba, Clark Wilson, and Chinese Wall.
Access Control MAC. CSCE Farkas 2 Lecture 17 Reading assignments Required for access control classes:  Ravi Sandhu and P. Samarati, Access Control:
Multics CysecLab Graduate School of Information Security KAIST.
Access Controls Henry Parks SSAC 2012 Presentation Outline Purpose of Access Controls Access Control Models –Mandatory –Nondiscretionary/Discretionary.
Information Security CS 526 Topic 17
Lecturer : Assoc. Prof. Dang Tran Khah Presenter: Tran Thach Lam 1.
A Lattice Model of Secure Information Flow By Dorothy E. Denning Presented by Drayton Benner March 22, 2000.
CSCE 201 Introduction to Information Security Fall 2010 Access Control Models.
Trusted Operating Systems
What is Access Control? Discretionary Access Control (DAC)
Archictecture for MultiLevel Database Systems Jeevandeep Samanta.
Computer Security: Principles and Practice
CS426Fall 2010/Lecture 211 Computer Security CS 426 Lecture 21 The Bell LaPadula Model.
Dr. Jeff Teo Class 4 July 2, Deliverables Lecture on Trusted Computing: Evolution and Direction Review of students’ blogs and assignments Summarize.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 16 October 14, 2004.
Security-Enhanced Linux Stephanie Stelling Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
Database Security Database System Implementation CSE 507 Some slides adapted from Navathe et. Al.
Access Controls Mandatory Access Control by Sean Dalton December 5 th 2008.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 5: Security Architecture and Models.
22 feb What is Access Control? Access control is the heart of security Definitions: * The ability to allow only authorized users, programs or.
Secure Operating System
Access Control Model SAM-5.
Access Control CSE 465 – Information Assurance Fall 2017 Adam Doupé
Operating System Structures
2. Access Control Matrix Introduction to Computer Security © 2004 Matt Bishop 9/21/2018.
Operating Systems Security
Basic Security Theorem
Computer Security Confidentiality Policies
Mandatory Access Control (MAC)
THE ORANGE BOOK Ravi Sandhu
Information Security CS 526 Topic 17
Advanced System Security
Confidentiality Models
DG/UX System Provides mandatory access controls Initially
Guest Lecture in Acc 661 (Spring 2007) Instructor: Christopher Brown)
Chapter 5: Confidentiality Policies
Computer Security Access Control
Computer Security Confidentiality Policies
Advanced System Security
Presentation transcript:

Design and Implementation MAC in Security Operating System CAI Yi, ZHENG Zhi-rong, SHEN Chang-xiang Presented By, Venkateshwarlu Jangili. 1

O utline: Introduction Mandatory Security Model What is BLP Defining Security Policy Security Levels Security Policies Defining Security Level Multi-Level Directories Conclusion 2

Introduction: MAC – Mandatory Access Control Users and Resources in the system are defined subjects and objects separately and abstractly by MAC. Security of system directly depends on operating system services and mechanisms. How is the System made Secure….??? 3

Contd… MAC Mechanisms are added to the OS. Users and Information in a system are assigned sensitivity labels that are a combination of Hierarchal and Non Hierarchal categories. Labels are the basis for MAC decisions. Subjects and Objects. 4

Mandatory Security Model Security model is used to describe the security characteristics of the system and users. Through this security architecture can be easily analyzed abstractly. Existence of Objects : which are viewed as the consisting information, Subjects: are the agents, which act upon those objects. 5

What does MAC do? MAC is the problem of appropriately governing subjects access to objects according to their security levels. The access of subjects to the objects should be mediated in accordance. Subjects : Human Users or Processors Objects : Containers of the sensitive information. 6

BLP(Bell and LaPadula Model) Model for the Mandatory Security Model. Goal: Describes system with multilevel security policy and operations in the system exactly. There are four access modes between subjects and objects, 1.Read-Only 2.Append 3. Execute 4. Read- Write 7

Components: System State: Each state in it is defined by V=(B*M*F*H), B is the P(S*0*A) M is the Access Control Matrix that can access Si to an object Oj. F – Functions of the Security level. f s(s) – Maximal Security Level, f c(s) – Current Security Level, f o(o) – Security Level of object. 8

State Transition: It is defined by a set of operation rules, Decision (output), Request (r) Next State p: RxV DxV RxV – request state pairs, DxV – Decision State pairs D = {yes, no, error, ?} State. : A system (R, D, W, z) is a subset of (X, Y, Z ), and (x, y, z ) (R, D, W, z) iff (xt, yt, zt, zt- 1) eW, z) is a beginning state. 9

Axiom of Model: 10

Defining Security Policy When a process accesses a object, the subject level would compared with the object level so that MAC can determine whether the process could access. Security Levels : a. Hierarchical classification and b. Nonhierarchical categories 11

Hierarchical classification : composes a partially ordered set of security levels, which can be coded by binary. Example : {top secret > secret > confidential > unclassified). Non-Hierarchical classification: unordered set. Example : Security UnixWare, it supports 256 classifications and 1024 Categories. 12

Security Levels: Security Levels S1 and S2: S1 dominates S2 iff, (a). S2 S1 (b). Classifications (S1 ≥ S2) S1 equal to S2 iff, (a). Classifications(S1=S2) (b). Categories (S1= S2) For all other Conditions, S1 is independent os S2. 13

Security Policies: Mandatory Security Policy 1: If and only if subject level dominates or equals to object level, a subject can have Read or Execute access to an Object; In the similar way it can have Write or Append access to object. This policy accords with the BLP model discussed earlier. Mandatory Security Policy 2: If and only if subject level dominates or equals to object level, a subject can have Read or Execute access to an Object; If subject level equals to object level, subject can have Write access. If subject level dominates object level, subject can have Append access. 14

This policy leaves potential damage during covert channel analysis. For example, a user with high-level can enable or disable write access to an object with high- level, but a process with low-level still can get information about whether this file could be written through a number of trial “Append”. So this policy is not very rational. Mandatory Security Policy 3: If and only if subject level dominates or equals to object level, a subject can have Read or Execute access to an object; If and only if Subject level equals to object level, a subject can have Write or Append access to an object. 15

Defining Security Level Users security level limits the user’s ability to read and change the information. This limits are enforced by the TCB. A level alias is assigned for every level and given by LID. It is the number system that uses to identify a level. Four Classifications, four categories and eight levels are predefined. This is mainly used to separate the Users from Administrators. 16

Multi-Level Directories 17

If a process’s multilevel directory mode is virtual, then an access to a multilevel directory by that process is modified by the kernel. The kernel changes the requested access to an access to an effective directory within the multilevel directory. If the process’s multilevel directory mode is real, an access to a multilevel directory by that process is not modified by the system. The process in real mode can see all effective directories in the multilevel directory, subject to MAC restrictions. 18

Conclusion: MAC is one of the key mechanism in security operating system, is absolutely necessary to enhance system security, and if there isn’t MAC the system wouldn’t reach to high security grade. Through designing and implementing above security policy and functions, adding MAC module in UnixWare, system security is increased highly. We test performance of some representative system calls separately in UnixWare with MAC module and in UnixWare without MAC module, it can be concluded that system efficiency is not decreased very much. 19

References: [l] Edmund Clarke and Jeannette Wing Formal methods State of the art aid future directions. Report of the ACM Workshop on Strategic Directions in Computing Research, Formal Methods Subgroup, August 1996 Available as CMU Computer Science Technical Report CMU- CS [2] IS0 WG3 Evaluation Criteria for IT Security, ISO/IEC Standard, ,

Thank you…!! 21