计算机工程与应用 ›› 2008, Vol. 44 ›› Issue (35): 1-4.DOI: 10.3778/j.issn.1002-8331.2008.35.001

• 博士论坛 • 上一篇    下一篇

增强可生存性的访问控制模型

单智勇1,2,3,石文昌2,3,梁 彬1,2,3,孟晓峰1,2   

  1. 1.中国人民大学 信息学院 计算机系,北京 100872
    2.教育部 数据工程与知识工程重点实验室,北京 100872
    3.中国人民大学 系统与信息安全研究实验室,北京 100872
  • 收稿日期:2008-09-12 修回日期:2008-10-06 出版日期:2008-12-11 发布日期:2008-12-11
  • 通讯作者: 单智勇

Access control model for enhancing survivability

SHAN Zhi-yong1,2,3,SHI Wen-chang2,3,LIANG Bin1,2,3,MENG Xiao-feng1,2   

  1. 1.School of Information,Renmin University of China,Beijing 100872,China
    2.Key Lab of Data Engineering & Knowledge Engineering,MOE,Beijing 100872,China
    3.Systems & Information Security Research Lab,Renmin University,Beijing 100872,China
  • Received:2008-09-12 Revised:2008-10-06 Online:2008-12-11 Published:2008-12-11
  • Contact: SHAN Zhi-yong

摘要: 针对传统访问控制模型应用到可生存系统时存在的局限性,提出可生存性访问控制的概念和要求,并设计一种可生存性访问控制模型TTC。TTC模型在系统受到入侵而被控制之后仍然能保护关键服务和数据,能实时响应入侵检测报警并指导入侵恢复工作。它包括触发、跟踪和控制等三个规则。触发规则和跟踪规则利用攻击树跟踪入侵者在系统内的活动,控制规则禁止被跟踪的主体破坏关键服务和数据。通过对模型的形式化证明,模型的应用示例,以及与传统访问控制模型的对比,证实了TTC模型在增强可生存性方面的价值。

关键词: 访问控制, 可生存性, 攻击树

Abstract: Traditional access control models have disadvantages when they are applied in a survivability system.An access control model for enhancing survivability is proposed,which named TTC.The model can protect critical services and data,response to intrusion alarm in real time and help recovery process even when the system is compromised.It contains three rules of trigger,track and control.The trigger and track rules trace activities of intruder in system by using attack tree.The control rule forbids the traced subjects to tamper critical services and data.The value of TTC for enhancing survivability is attested by formal proving,application demonstration and comparing with traditional access control models.

Key words: access control, survivability, attack tree