TY - GEN
T1 - Tracing the diffusion of classified information triggered by file open system call
AU - Nomura, Yoshinari
AU - Hakomori, Satoshi
AU - Yokoyama, Kazutoshi
AU - Taniguchi, Hideo
PY - 2006/1/1
Y1 - 2006/1/1
N2 - Recently, leakage of classified information such as personal information has become serious problem. To prevent the leakage, it is important to know how the information diffuses in a computer system. In this paper, we propose a method for tracing the diffusion of the classified information. We assumed that the classified information exists in a set of files on a file system. These files will be diffused by processes (programs). Once a process touched any classified file, it becomes a suspicious carrier process. The carrier process will make other classified files. Therefore, to keep track of the diffusion, we have to watch all processes to see if they touch any classified files. That is, we have to insert some probes into an operating system to watch file manipulation system-calls of processes such as OPEN and CLOSE. We describe the algorithm of the method and an implementation of the method on the Linux kernel. We also show that the performance of our implementation is efficient.
AB - Recently, leakage of classified information such as personal information has become serious problem. To prevent the leakage, it is important to know how the information diffuses in a computer system. In this paper, we propose a method for tracing the diffusion of the classified information. We assumed that the classified information exists in a set of files on a file system. These files will be diffused by processes (programs). Once a process touched any classified file, it becomes a suspicious carrier process. The carrier process will make other classified files. Therefore, to keep track of the diffusion, we have to watch all processes to see if they touch any classified files. That is, we have to insert some probes into an operating system to watch file manipulation system-calls of processes such as OPEN and CLOSE. We describe the algorithm of the method and an implementation of the method on the Linux kernel. We also show that the performance of our implementation is efficient.
KW - Diffusion of classified information
KW - Operating system
KW - Security
KW - System software
UR - http://www.scopus.com/inward/record.url?scp=84898444805&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84898444805&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:84898444805
SN - 9806560841
SN - 9789806560840
T3 - CITSA 2006 - 3rd Int. Conf. on Cybernetics and Information Technol., Systems and Applications, Jointly with the 4th Int. Conf. on Computing, Communications and Control Technologies, CCCT 2006 - Proc.
SP - 312
EP - 317
BT - CITSA 2006 - 3rd Int. Conf. on Cybernetics and Information Technol., Systems and Applications, Jointly with the 4th Int. Conf. on Computing, Communications and Control Technologies, CCCT 2006 - Proc.
PB - International Institute of Informatics and Systemics, IIIS
T2 - 3rd International Conference on Cybernetics and Information Technologies, Systems and Applications, CITSA 2006, Jointly with the 4th International Conference on Computing, Communications and Control Technologies, CCCT 2006
Y2 - 20 July 2006 through 23 July 2006
ER -