Abstract

The technology of security in computer networks has far-reaching implications. In this paper, assuming a UNIX network system, which is the most popular currently, we enumerate the threats against security and classify the problems. Among the problems so defined, we consider particularly the Trojan horse problem, which is important when a program is received from the outside; and we propose a method of protection against Trojan horses. In the proposed protection method, objects which have been modified by the source program are extracted and are compared with a previously prepared list (the condition list) of objects which should not have been modified. In this method, verification of the security of the program needs to be done only at the time of its installation, so there is no loss in efficiency of performance at run time. Also, we can prevent security violations which cannot be regulated by controlling access and flow. In the proposed method, the major problem is determining the extent to which altered objects can be detected. In this regard, we perform soine experiments on the free software X11R4 and TeX. Finally, based on the results of the experiments, we evaluate the proposed protection method on the security of programs imported from the outside.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.