Evaluation of Performance of Secure OS Using Performance Evaluation Mechanism of LSM-Based LSMPMON
نویسندگان
چکیده
Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSes can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSes for Linux have been developed. In these OSes, different implementation methods have been adopted. However, there is no method for easily evaluating the performance of the secure OS in detail, and the relationship between the implementation method and the performance is not clear. The secure OS in Linux after version 2.6 has often been implemented by Linux Security Modules (LSM). Therefore, we determine the effect of introducing the secure OS on the performance of the OS, and a characteristic by the difference of the implementation method by using the overhead measurement tool, the LSM Performance Monitor (LSMPMON); the LSMPMON can be used to evaluate three different secure OSes.
منابع مشابه
LSMPMON: Performance Evaluation Mechanism of LSM-based Secure OS
Security focused OS (Secure OS) is attracting attention as a method for minimizing damage caused by various intrusions. Secure OSs can restrict the damage due to an attack by using Mandatory Access Control (MAC). In some projects, secure OSs for Linux have been developed. In these OSs, different implementation methods have been adopted. However, there is no method for easily evaluating the perf...
متن کاملSecure Bio-Cryptographic Authentication System for Cardless Automated Teller Machines
Security is a vital issue in the usage of Automated Teller Machine (ATM) for cash, cashless and many off the counter banking transactions. Weaknesses in the use of ATM machine could not only lead to loss of customer’s data confidentiality and integrity but also breach in the verification of user’s authentication. Several challenges are associated with the use of ATM smart card such as: card clo...
متن کاملPerformance Evaluation of Supply Chain under Decentralized Organization Mechanism
Abstract Nowadays among many evaluation methods, data envelopment analysis has widely used to evaluate the relative performance of a set of Decision Making Units (DMUs). Data Envelopment Analysis (DEA(is a mathematical tool for evaluating the relative efficiency of a set Decision Making Units (DMUs), with multiple inputs and outputs. Traditional DEA models treat with each DMU as a “black box" t...
متن کاملWater Flooding Performance Evaluation Using Percolation Theory
Water flooding is a well-known secondary mechanism for improving oil recovery. Conventional approach to evaluate the performance of a water flooding process (e.g. breakthrough and post breakthrough behavior) is to establish a reliable geological reservoir model, upscale it, and then perform flow simulations. To evaluate the uncertainty in the breakthrough time or post breakthrough behavior, thi...
متن کاملThe Extraction of Influencing Indicators for Scoring of Insurance Companies Branches Based on GMDH Neural Network
O ne of the key topics and the most important tools to determine the strengths, weaknesses, opportunities and threats of each organization and company is the evaluation the performance of organizational activities that rating and ranking follows the internal and external goals. In this regard insurance companies similarly are looking for evaluation of their branches through scoring, ...
متن کامل