Design and implementation of a tool for analyzing SELinux secure policy

  • Authors:
  • Gaoshou Zhai;Wenlin Ma;Minli Tian;Na Yang;Chengyu Liu;Hengsheng Yang

  • Affiliations:
  • Beijing Jiaotong University, Hai Dian District, Beijing, China;Beijing Jiaotong University, Hai Dian District, Beijing, China;Beijing Jiaotong University, Hai Dian District, Beijing, China;Beijing Jiaotong University, Hai Dian District, Beijing, China;Beijing Jiaotong University, Hai Dian District, Beijing, China;Beijing Jiaotong University, Hai Dian District, Beijing, China

  • Venue:
  • Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
  • Year:
  • 2009

Quantified Score

Hi-index 0.01

Visualization

Abstract

SELinux can enforce a policy based on mandatory access control (MAC) for Linux so as to fulfill the security requirements of more strict access control for those hierarchical and classified management organizations or situations. But security policy configuration is a hard and intractable task for SELinux due to its recondite policy description language and huge number of complicated security policies. Thereafter, it is rather significant to build a powerful assistant tool to help security managers to perform security policy configurations. And the key problem is to analyze configured security policies automatically or semi-automatically so that as many configuration loopholes as possible can be detected and then be eliminated. In this paper, both security models and policy description language supported by SELinux are summarized at first. While methods for analyzing security policies are discussed in details secondly. Then a prototype for a tool to analyze security policies automatically is designed, implemented and tested as well as some preliminary test results are given. Finally, the research work in this paper is summed up and some further research directions are pointed out.