On the verification of intransitive noninterference in mulitlevel security

被引:44
作者
Ben Hadj-Alouane, N [1 ]
Lafrance, S
Lin, F
Mullins, J
Yeddes, MM
机构
[1] Univ Manouba, Natl Sch Informat Sci, Dept Appl Comp Sci, CRISTAL Lab, Manouba 2010, Tunisia
[2] Ecole Polytech, Dept Comp Engn, Design & Realizat Complex Syst CRAC Lab, Montreal, PQ H3T 2B1, Canada
[3] Wayne State Univ, Dept Elect & Comp Engn, Detroit, MI 48202 USA
[4] Tongji Univ, Sch elect & Informat Engn, Shanghai 200092, Peoples R China
来源
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS | 2005年 / 35卷 / 05期
关键词
denial of service; formal verification; information flow; interference; intransitive noninterference (INI); observability; purge; security policies;
D O I
10.1109/TSMCB.2005.847749
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose an algorithmic approach to the problem of verification of the property of intransitive noninterference (INI), using tools and concepts of discrete event systems (DES). INI can be used to characterize and solve several important security problems in multilevel security systems. In a previous work, we have established the notion of iP-observability, which precisely captures the property of INI. We have also developed an algorithm for checking iP-observability by indirectly checking P-observability for systems with at most three security levels. In this paper, we generalize the results for systems with any finite number of security levels by developing a direct method for checking iP-observability, based on an insightful observation that the iP function is a left congruence in terms of relations on formal languages. To demonstrate the applicability of our approach, we propose a formal method to detect denial of service vulnerabilities in security protocols based on INI. This method is illustrated using the TCP/IP protocol. The work extends the theory of supervisory control of DES to a new application domain.
引用
收藏
页码:948 / 958
页数:11
相关论文
共 18 条
[1]  
[Anonymous], MTR2997 MITR CORP
[2]  
[Anonymous], 2000, J UNIVERS COMPUT SCI
[3]  
Focardi R., 1994, Journal of Computer Security, V3, P5
[4]  
Focardi R, 2000, LECT NOTES COMPUT SC, V1816, P258
[5]  
FOCARDI R, 2000, DERA RHUL WORKSH SEC
[6]  
Goguen J. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P11
[7]  
HADJALOUANE NB, IN PRESS IEEE T AUTO
[8]   EXTENDING THE NONINTERFERENCE VERSION OF MLS FOR SAT [J].
HAIGH, JT ;
YOUNG, WD .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) :141-150
[9]  
Hopcroft J.E., 2001, INTRO AUTOMATA THEOR
[10]  
Lafrance S, 2003, J UNIVERS COMPUT SCI, V9, P1350