Compromises on data integrity and confidentiality have exposed the vulnerability of security architectures of traditional Linux-based operating systems against malicious attacks. Minimized functionality and increased complexity restrict the effectiveness of traditional approaches such as sandboxing in handling attacks. We proposed architecture based on restricted user privileges and authorization to secure the Linux operating system. We developed a Secure Daemon to authorize the system calls. All the system calls invoked by user processes are redirected to secure daemon using a dynamic dispatch mechanism (wrapper functions) implemented on top of the existing libraries. Our approach ensures that critical system resources are protected in the event of an attack. Since the major elements of the proposed system operate at the user level, it is portable across all Linux distributions. ©2006-2017 Asian Research Publishing Network (ARPN). All rights reserved.
cited By 0
V. Radhakrishnan, Narayanan, H., and Shiju Sathyadevan, “System call authorization in linux by a secure daemon”, ARPN Journal of Engineering and Applied Sciences, vol. 12, pp. 3903-3908, 2017.