A Method of Detecting Real-Time Elevation of Privilege Security Module Using User Credentials


KIPS Transactions on Computer and Communication Systems, Vol. 6, No. 5, pp. 247-254, May. 2017
10.3745/KTCCS.2017.6.5.247,   PDF Download:
Keywords: System security, Elevation of Privilege Attack, Credentials
Abstract

In a Linux system, a user with malicious intent can acquire administrator privileges through attack types that execute shells, and can leak important user information and install backdoor program. In order to solve this problem, the existing method is to analyze the causes of the elevation of privilege, fix the problems, and then patch the system. Recently, a method of detecting an illegal elevated tasks in which information inconsistency occurs through user credentials in real time has been studied. However, since this credential method uses uid and gid, illegal elevated tasks having the root credentials may not be detected. In this paper, we propose a security module that stores shell commands and paths executed with regular privileges in a table and compares them with every file accesses (open, close, read, write) that are executed to solve the case which cannot detect illegal elevated tasks have same credential.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from September 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. C. Jun, K. W. Il, K. H. Jung, L. C. Hoon, "A Method of Detecting Real-Time Elevation of Privilege Security Module Using User Credentials," KIPS Transactions on Computer and Communication Systems, vol. 6, no. 5, pp. 247-254, 2017. DOI: 10.3745/KTCCS.2017.6.5.247.

[ACM Style]
Sim Chul Jun, Kim Won Il, Kim Hyun Jung, and Lee Chang Hoon. 2017. A Method of Detecting Real-Time Elevation of Privilege Security Module Using User Credentials. KIPS Transactions on Computer and Communication Systems, 6, 5, (2017), 247-254. DOI: 10.3745/KTCCS.2017.6.5.247.