首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于TCM的可信事件日志生成方法
引用本文:王健,程帅帅.基于TCM的可信事件日志生成方法[J].北方交通大学学报,2013(5):93-99.
作者姓名:王健  程帅帅
作者单位:北京交通大学计算机与信息技术学院,北京100044
基金项目:中央高校基本科研业务费专项资金资助(2012JBZ010,2012JBM041,2011JBM217);新世纪优秀人才支持计划项目资助(NCET-11-0565);教育部高校创新团队项目资助(IRT201206)
摘    要:系统事件日志记录是系统安全审计最重要的数据源.现有的日志保护机制主要解决事件日志生成后的数据完整性保护方面的问题,但对于日志数据生成阶段的可信生成方面还没有解决.本文主要贡献是提出了一种基于TCM模块的可信事件日志生成方法,为事件日志提供了生成时的数据完整性、可认证性等安全特性,增强了事件日志数据的可信性,通过分析证明了本方法的有效性和可实施性.

关 键 词:日志安全  TCM  可信生成  操作拦截

Trusted generation method for event logs based on TCM
WANG Jian,CHENG Shuaishuai.Trusted generation method for event logs based on TCM[J].Journal of Northern Jiaotong University,2013(5):93-99.
Authors:WANG Jian  CHENG Shuaishuai
Institution:(School of Computer and Information Technology, Beijing Jiaotong University, Beijing 100044, China)
Abstract:System event log is the most important data source for system security auditing, which is vulnerable to malicious tampering or deleted, the event log data integrity protection has roused the attention of the researchers. Existing log protection mechanisms mainly solve the data integri- ty protection in the event log after it has generated, such as log data storage backup integrity pro- tection and efficiency, but they have not been solved for the log data phase of credible generation. This paper puts forward a credible event log generation approach based on TCM module. It also provides the data integrity, authentication security features and so on when the event log is gener- ating, and enhances the events log data credibility. It proves that this method is effective and practical through the analysis.
Keywords:log security  TCM  trusted generation  operation intercept
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号