Please use this identifier to cite or link to this item:
https://rda.sliit.lk/handle/123456789/2711
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kularatna, I. M | - |
dc.contributor.author | Rajapaksha, S | - |
dc.date.accessioned | 2022-06-24T10:30:05Z | - |
dc.date.available | 2022-06-24T10:30:05Z | - |
dc.date.issued | 2022-04-14 | - |
dc.identifier.citation | I. M. Kularatna and U. U. S. Rajapaksha, "Development of Agent-Based Centralized Tool For Analyzing and Managing Security-Enhanced Linux Policies using WebSocket Protocol," 2022 2nd International Conference on Advanced Research in Computing (ICARC), 2022, pp. 302-307, doi: 10.1109/ICARC54489.2022.9753853. | en_US |
dc.identifier.isbn | 978-1-6654-0741-0 | - |
dc.identifier.uri | http://rda.sliit.lk/handle/123456789/2711 | - |
dc.description.abstract | The SELinux facilitates and includes an extensible "MAC" structure built within the Linux kernel. An application or a process life cycle that runs as a user has the specific authority to access objects such as files, sockets, and other processes with Linux’s default Discretionary Access Control (DAC). SELinux prescribes the access and the progress privileges of each user, application, process, and the files on the system and administers the communications of these elements utilizing a security strategy that determines how severe or indulgent a given Red Hat Enterprise Linux establishment ought to be. However, its constraints such as, not being user-friendly, having too complicated policies, and complex policy description language, are limiting the implementation of SELinux policies in the Information Technology industry. As a result, there is only a little research available on User Interface-based policy management tools. Even those researches have limitations such as the inability to remotely manage a host/server, manual documentation, and the inability to monitor the systems automatically from a dashboard. In order to overcome said research gap and problems, this research will implement a system using a web-socket technology that facilitates the ability to converse in full-duplex through just one TCP connection. This system is included with a web socket-agent, which can be installed in server endpoints and can change SELinux policies, a web-socket server: which can do live communication with the agent to perform policy changes along with the UI component: to manage policies using the user interface and a database component to store policy details. | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | 2022 2nd International Conference on Advanced Research in Computing (ICARC); | - |
dc.subject | Development | en_US |
dc.subject | Agent-Based | en_US |
dc.subject | Centralized Tool | en_US |
dc.subject | Analyzing | en_US |
dc.subject | Managing | en_US |
dc.subject | Security-Enhanced | en_US |
dc.subject | Linux Policies | en_US |
dc.subject | WebSocket Protocol | en_US |
dc.title | Development of Agent-Based Centralized Tool For Analyzing and Managing Security-Enhanced Linux Policies using WebSocket Protocol | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1109/ICARC54489.2022.9753853 | en_US |
Appears in Collections: | Department of Information Technology Research Papers - IEEE Research Papers - SLIIT Staff Publications Research Publications -Dept of Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Development_of_Agent-Based_Centralized_Tool_For_Analyzing_and_Managing_Security-Enhanced_Linux_Policies_using_WebSocket_Protocol.pdf Until 2050-12-31 | 1.19 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.