• Title/Summary/Keyword: linux

Search Result 1,580, Processing Time 0.044 seconds

Study of Static Analysis and Ensemble-Based Linux Malware Classification (정적 분석과 앙상블 기반의 리눅스 악성코드 분류 연구)

  • Hwang, Jun-ho;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1327-1337
    • /
    • 2019
  • With the growth of the IoT market, malware security threats are steadily increasing for devices that use the linux architecture. However, except for the major malware causing serious security damage such as Mirai, there is no related technology or research of security community about linux malware. In addition, the diversity of devices, vendors, and architectures in the IoT environment is further intensifying, and the difficulty in handling linux malware is also increasing. Therefore, in this paper, we propose an analysis system based on ELF which is the main format of linux architecture, and a binary based analysis system considering IoT environment. The ELF-based analysis system can be pre-classified for a large number of malicious codes at a relatively high speed and a relatively low-speed binary-based analysis system can classify all the data that are not preprocessed. These two processes are supposed to complement each other and effectively classify linux-based malware.

Management and Security of User in Linux Server (리눅스 서버의 사용자 관리 및 보안)

  • Jung, Sung-Jae;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.587-594
    • /
    • 2015
  • Open operating system, Linux is the traditional Web, E-mail, DNS, FTP server, as well as being used in Cloud and Big data infrastructure. In addition, Linux is also used like a desktop or mobile devices, smart TV and cars. In particular, stepping up to the IoT era at this time is expected to be greater proportion occupied by Linux. As the use of Linux has increased security has emerged as an important factor. User management is core of Linux system security. In this paper, Classifying Linux user and analyzed the role of the user-specific file. Finally, we analyzed the linux management technologies and useful user security tools.

Trend analysis and Classification of Linux distributions (리눅스 배포판의 분류 및 동향 분석)

  • Jung, Sung-Jae;Sung, Kyung
    • Journal of Digital Contents Society
    • /
    • v.18 no.2
    • /
    • pp.357-363
    • /
    • 2017
  • The Linux operating system, considered to be a subset of the UNIX operating system, is becoming the backbone of the enterprise server market and is seen as the key to building cloud computing and big data infrastructures. Linux has a variety of Linux distributions due to the fact that the source is open and anyone can freely modify and distribute it. First of all, Linux dominated the server market, the emergence of various distributions dominates the desktop and mobile operating system markets. In this paper, we examine the birth and history of Linux and classify and characterize various Linux distributions. The emergence of various Linux distributions will play a pivotal role in the Internet of Things and will further expand their power.

The Analysis of Memory Map for Improving the Execution Speed of Embedded Linux Kernel (임베디드 리눅스 커널의 실행속도 향상을 위한 메모리 맵 분석)

  • Lee, Doo-Wan;Jang, Kyung-Sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.801-804
    • /
    • 2009
  • In this paper, the Linux kernel memory map was analyzed as the approach to Improving performance for Embedded Linux system. Since the Linux kernel memory map supporting a stability and various H/W platforms and in which it becomes to the general purpose system with optimization manages the role of being important in the booting time and the efficient system utilization of resources, the analysis of the kernel memory map is required for the performance improvement of the Embedded Linux system in which it is restrictive the resources. According to the analysis result, and of the Linux kernel memory, the booting speed of and improvement of the memory efficiency were confirmed. It is therefore considered that the proposed in this paper and kernel memory allocation method are suitable to the memory availability improvement of the Embedded Linux system.

  • PDF

Supporting GPGPU in Linux kernel mode (Linux kernel mode에서의 GPGPU 지원)

  • Ahn, Woo-Geun;Lee, Shin-Hyoung;Yoo, Chuck
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.161-163
    • /
    • 2012
  • 전통적으로 단순 그래픽 연산에만 사용되던 GPU는 연산 속도의 증가와 고수준의 언어 지원을 통해서 일반적인 용도로도 사용 가능한 GPGPU기술로 발전했다. GPGPU는 병렬 처리 능력과 속도 개선을 목적으로 다방면에 걸쳐 사용되고 있는데, 기본적으로 Linux user mode에서의 사용만 가능하며 kernel mode에서의 사용은 지원되지 않는다. Linux kernel 내부에서도 GPGPU 사용이 가능해진다면, User application 뿐만 아니라 Linux kernel의 성능 개선에도 GPGPU를 사용할 수 있을 것이다. 우리는 Linux kernel의 system call과 user mode의 mediator process를 사용한 Linux kernel mode에서의 GPGPU 사용법을 제시하고, 향후 성능 개선을 위한 기준점을 제공한다.

A Study on the Protection against Buffer-Overflow Attack using Modifed Linux Kernel (Linux 커널 수정을 통한 Buffer Overflow Attack 방지에 관한 연구)

  • 서정택;최홍민;손태식;김동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10a
    • /
    • pp.635-637
    • /
    • 2000
  • Linux는 다양한 하드웨어 플랫폼을 지원하며, 강력한 네트워크 지원 기능, 다양한 형식의 파일시스템 지원 기능 등 높은 성능을 자랑한다. 그러나, 소스코드의 공개로 인하여 많은 보안상의 취약성을 내포하고 있으며, 최근 이를 이용한 해킹사고가 많이 발생하고 있다. 본 논문에서는 Linux상에 상존하는 보안 취약성을 조사하고, 보안 요구사항을 도출하며, 최근 해킹의 상당부분을 차지하고 있는 Buffer Overflow 공격 방지를 위한 방안으로 커널 수정을 통해 Secure Linux를 개발하고자 한다.

  • PDF

Design of the Kernel Hardening in the Linux O.S. (Linux 운영체제에서 Kernel Hardening 설계)

  • Moon, Ji-Hoon;Kim, Ki-Hwan;Jang, Seung-Ju;Jung, Seung-In
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05a
    • /
    • pp.431-434
    • /
    • 2003
  • 본 논문에서는 Linux 운영체제에서의 kernel hardening을 설계한다. 커널 내에서 panic 이 발생할 경우 복구가 가능한 경우에는 정상적인 동작이 될 수 있도록 한다. 이렇게 함으로써 Linux Kernel Hardening 기능은 안정적인 커널의 동작을 보장한다. 본 논문에서 Linux Kernel Hardening을 보장하기 위하여 커널 내 ASSERT(), BUG() 함수를 중심으로 설계를 한다.

  • PDF

An Implementation of Priority Based Task Scheduling in Real-time Linux using Bit Masking Method (Real-Time Linux에서 Bit Masking 기법을 이용한 우선순위 기반의 태스크 스케줄링 구현)

  • 신귀매;김용석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.04a
    • /
    • pp.82-84
    • /
    • 2001
  • Real-Time Linux는 기존의 Linux에 실시간 기능을 추가한 것으로서, 태스크 스케줄링 방법은 우선순위 기반의 스케줄링 방법을 사용한다. 그러나, 태스크의 개수가 많아지면 가장 높은 우선순위의 태스크를 찾는데 걸리는 시간이 태스크 개수에 비례해서 많이 걸린다. 이러한 이유로 태스크의 개수가 제한적일 수밖에 없다. 본 논문에서는 우선순위별로 서로 다른 목록을 유지하고, Bit Masking 기법을 사용함으로써 가장 높은 우선순위 태스크를 선택하는데 걸리는 시간을 상수시간으로 줄이고 각 태스크들의 시그널을 처리하는 부분을 좀더 효율적으로 처리하도록 함으로써 Real-Time Linux의 실시간 스케줄링 기능을 개선하였다.

The Implementation of Data Logging System by Using VME Modules based on Real Time Linux (RT-Linux를 OS로 하는 VME시스템을 이용한 Data Logging System 구현)

  • Hwang, Seok-Kyun;Koo, Kyung-Mo;Joo, Moon-G.;Lee, Jin-S.
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.709-712
    • /
    • 2003
  • In this research, we port the RT-Linux to MVME 5100 board which is driven by VxWorks or Vertex until now. And, we developed the data logging modules by using the RT-Linux. This module gathers two different scan timing data from plant and sends this data to the host controller with real time.

  • PDF

Design and Implementation of Linux-based Integrated Security System(LISS) Using Open Security Tools (공개 보안 도구를 이용한 리눅스 기반 통합 보안 시스템의 설계 및 구현)

  • Jeon, Yong-Hee;Kim, Min-Soo;Jang, Jung-Sook
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.485-496
    • /
    • 2004
  • The wide spread of Internet makes susceptible to the attacks via communication Web from hackers using the vulnerability of both computer and network systems. In this paper, we design and implement an integrated security system, named as LISS(Linux-based Integrated Security System) in which an integrated security management is possible. This system is based on the open operating system, Linux and consists of open security tools, which is effective in security management of Linux based-servers. We also construct a test-bed in order to testify the performance of the LISS. It is revealed that the implemented system captures all the attack Patterns generated from Network Mapper.