Computer Science ›› 2019, Vol. 46 ›› Issue (2): 139-144.doi: 10.11896/j.issn.1002-137X.2019.02.022

• Information Security • Previous Articles     Next Articles

Illegal Flow Analysis for Lattice Model of Information Flow

WANG Xue-jian, ZHAO Guo-lei, CHANG Chao-wen, WANG Rui-yun   

  1. PLA Information Engineering University,Zhengzhou 450001,China
  • Received:2018-07-04 Online:2019-02-25 Published:2019-02-25

Abstract: With the development of the Internet,the status of cyberspace has risen,and the importance of information is increasing.To ensure the security of information,it is particularly important for the control of illegal information flow.This paper analyzed the security of information flow in a lattice model of information flow,and classified the information flow inside the model better.Firstly,the linear analysis is done for the lattice model of the information flow,which is called a linear lattice model of information flow.Then,the Markov chain is introduced,the state attribute of the Markov chain is used,and the probability variation of the two states in the Markov chain is used to quantify the representation between the subject and the object in the model.Further,the security state of each information flow is analyzed by comparing the probability of the normal return state and the transient state corresponding to the internal body and the object respectively.That is to say,when two constant return states occur simultaneously in the model detection,the security model is violated,and an illegal information flow occurs.Due to the identity of the change in probability,the method produces errors and affects its detection results.In order to overcome this shortcoming,this paper introduced the SPA language,then described the SPA language of the linear information flow model,and used the non-interference method in formalization to make the lack of probability identity in the Markov chain model.Finally,the illegal information flow hidden in it is detected,the security state of each information flow with error is judged,and it is concluded that the information flow that conforms to the security model but violates the security policy does not satisfy the non-interference attribute.This is a major significance on software design and hardware application.

Key words: Covert channel, Information flow, Markov chain, Non-interference, SPA

CLC Number: 

  • TP309
[1]JANCZEWSKI,LECH J,ANDREW M.Information Security Policy[J].IEEE Software,2005,17(5):26-32.
[2]ADETOYE A O,BADII A.A Policy Model for Secure Information Flow[C]∥ Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security.Springer Berlin Heidelberg,2009:1-17.
[3]DENNING D E.Certification of programs for secure information flow[J].Communications of the Acm,1977,20(20):504-513.
[4]YANG P,WANG Q,MI X,et al.An Improved BLP Model with More Flexibility[C]∥ International Conference on Embedded Software and Systems.IEEE,2017:192-197.
[5]LIU G,ZHANG J,LIU J,et al.Improved Biba model based on trusted computing[J].Security & Communication Networks,2015,8(16):2793-2797.
[6]GOGUEN J A,MESEGUER J.Unwinding and Inference Control[C]∥ 1984 IEEE Symposium on Security and Privacy.IEEE,2016:75.
[7]OLMEDO M T C,MAS J F.Markov Chain[M]∥Geomatic Approaches for Modeling Land Change Scenarios.2018.
[8]HASUO I.Generic Forward and Backward Simulations II:Pro- babilistic Simulation[C]∥International Conference on Concurrency Theory.Springer-Verlag,2010:447-461.
[9]REZAEI F,HEMPEL M,RAKSHIT S M,et al.Automated Covert Channel Modeling over a real network platform[C]∥Wireless Communications and Mobile Computing Conference.IEEE,2014:559-564.
[10]BARR T W,RIXNER S.Medusa:managing concurrency and communication in embedded systems[C]∥Usenix Conference on Usenix Technical Conference.USENIX Association,2014:439-450.
[11]LAMPSON B W.Computer security in the real world[J].Computer,2004,37(6):37-46.
[12]KAUR J,WENDZEL S,EISSA O,et al.Covert channel-internal control protocols:attacks and defense[J].Security & Communication Networks,2016,9(15):2986-2997.
[13]YANG C H,WANG H Y.Modeling and Weaving of Stateful Aspects of Architecture Layer——Based on LTS Method[J].Chinese Journal of Computers,2011,34(2):342-352.(in Chinese)
杨春花,王海洋.体系结构层状态型方面的建模和编织——基于LTS的方法[J].计算机学报,2011,34(2):342-352.
[14]RYAN P Y A.Mathematical Models of Computer Security[M]∥ Computer Security Handbook,Sixth Edition.John Wiley & Sons Inc.,2000:1-62.
[15]ALDINI A,BRAVETTI M,GORRIERI R.A process-algebraic approach for the analysis of probabilistic noninterference[J].Journal of Computer Security,2004,12(2):191-245.
[16]GUNAWAN L A,HERRMANN P.Compositional Verification of Application-Level Security Properties[M]∥Engineering Secure Software and Systems.Springer Berlin Heidelberg,2013:75-90.
[17]NANEVSKI A,BANERJEE A,GARG D.Verification of Information Flow and Access Control Policies with Dependent Types[C]∥IEEE Symposium on Security and Privacy.IEEE Compu-ter Society,2011:165-179.
[18]DENNING,DOROTHY E.Framework and principles for active cyber defense[J].Computers & Security,2014,40:108-113.
[1] LI Rong-fan, ZHONG Ting, WU Jin, ZHOU Fan, KUANG Ping. Spatio-Temporal Attention-based Kriging for Land Deformation Data Interpolation [J]. Computer Science, 2022, 49(8): 33-39.
[2] LI Xia, MA Qian, BAI Mei, WANG Xi-te, LI Guan-yu, NING Bo. RIIM:Real-Time Imputation Based on Individual Models [J]. Computer Science, 2022, 49(8): 56-63.
[3] WEI Kai-xuan, FU Ying. Re-parameterized Multi-scale Fusion Network for Efficient Extreme Low-light Raw Denoising [J]. Computer Science, 2022, 49(8): 120-126.
[4] TAN Ying-ying, WANG Jun-li, ZHANG Chao-bo. Review of Text Classification Methods Based on Graph Convolutional Network [J]. Computer Science, 2022, 49(8): 205-216.
[5] PAN Zhi-yong, CHENG Bao-lei, FAN Jian-xi, BIAN Qing-rong. Algorithm to Construct Node-independent Spanning Trees in Data Center Network BCDC [J]. Computer Science, 2022, 49(7): 287-296.
[6] SUN Xiao-han, ZHANG Li. Collaborative Filtering Recommendation Algorithm Based on Rating Region Subspace [J]. Computer Science, 2022, 49(7): 50-56.
[7] ZENG Zhi-xian, CAO Jian-jun, WENG Nian-feng, JIANG Guo-quan, XU Bin. Fine-grained Semantic Association Video-Text Cross-modal Entity Resolution Based on Attention Mechanism [J]. Computer Science, 2022, 49(7): 106-112.
[8] MENG Yue-bo, MU Si-rong, LIU Guang-hui, XU Sheng-jun, HAN Jiu-qiang. Person Re-identification Method Based on GoogLeNet-GMP Based on Vector Attention Mechanism [J]. Computer Science, 2022, 49(7): 142-147.
[9] SHAN Xiao-ying, REN Ying-chun. Fishing Type Identification of Marine Fishing Vessels Based on Support Vector Machine Optimized by Improved Sparrow Search Algorithm [J]. Computer Science, 2022, 49(6A): 211-216.
[10] LI Dan-dan, WU Yu-xiang, ZHU Cong-cong, LI Zhong-kang. Improved Sparrow Search Algorithm Based on A Variety of Improved Strategies [J]. Computer Science, 2022, 49(6A): 217-222.
[11] YANG Yue, FENG Tao, LIANG Hong, YANG Yang. Image Arbitrary Style Transfer via Criss-cross Attention [J]. Computer Science, 2022, 49(6A): 345-352.
[12] HAO Qiang, LI Jie, ZHANG Man, WANG Lu. Spatial Non-cooperative Target Components Recognition Algorithm Based on Improved YOLOv3 [J]. Computer Science, 2022, 49(6A): 358-362.
[13] WANG Jin, LIU Jiang. GPU-based Parallel DILU Preconditioning Technique [J]. Computer Science, 2022, 49(6): 108-118.
[14] SHAO Yan-hua, LI Wen-feng, ZHANG Xiao-qiang, CHU Hong-yu, RAO Yun-bo, CHEN Lu. Aerial Violence Recognition Based on Spatial-Temporal Graph Convolutional Networks and Attention Model [J]. Computer Science, 2022, 49(6): 254-261.
[15] JIN Li-zhen, LI Qing-zhong. Fast Structural Texture Image Synthesis Algorithm Based on Seam ConsistencyCriterion [J]. Computer Science, 2022, 49(6): 262-268.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!