Document Type
Technical Report
Publication Date
2005-11-22
Technical Report Number
WUCSE-2005-55
Abstract
Popular security techniques such as public-private key encryption, firewalls, and role-based access control offer significant protec-tion of system data, but offer only limited protection of the computations using that data from significant interference due to accident or adversarial attack. However, in an increasing number of modern systems, ensuring the reliable execution of system activities is every bit as important as ensuring data security. This paper makes three contributions to the state of the art in protection of the execution of system activities from accidental or adversarial interference. First, we consider the motivating problem of CPU-focused denial of service attacks, and explain how limitations of current approaches to these kinds of attacks make it difficult to offer sufficiently rigorous and fine-grained assurances of protection for the execution of system computations. Second, we describe a novel solution approach in which we have integrated fine-grained scheduling decision functions with system call hooks from the Security Enhanced Linux (SELinux) framework within the Linux 2.6 kernel. Third, we present empirical evaluations of the efficacy of our approach in controlling the CPU utilization of competing greedy computations that are either completely CPU bound, or that interleave I/O and CPU access, across a range of relative allocations of the CPU.
Recommended Citation
Migliaccio, Armando; Tidwell, Terry; Gill, Christopher; Aswathanarayana, Tejasvi; and Niehaus, Douglas, "Group Scheduling in SELinux to Mitigate CPU-Focused Denial of Service Attacks" Report Number: WUCSE-2005-55 (2005). All Computer Science and Engineering Research.
https://openscholarship.wustl.edu/cse_research/971
Comments
Permanent URL: http://dx.doi.org/10.7936/K7CF9NF7