Paper
19 July 2024 Behavior-based dynamic trusted measurement scheme
Xianqun Han, Jianbiao Zhang
Author Affiliations +
Proceedings Volume 13181, Third International Conference on Electronic Information Engineering, Big Data, and Computer Technology (EIBDCT 2024); 131811O (2024) https://doi.org/10.1117/12.3031239
Event: Third International Conference on Electronic Information Engineering, Big Data, and Computer Technology (EIBDCT 2024), 2024, Beijing, China
Abstract
Trusted computing is an effective means of system security protection, encompassing various security solutions. However, these solutions exhibit individual shortcomings, such as the co-location of protective code and system, a singular metric determination standard, and discontinuity in trusted measurements. Consequently, they fail to meet security requirements. Hence, we propose a Behavior-Based Dynamic Trusted Measurement scheme (BBDTM). Firstly, the scheme designs a dynamic measurement framework based on a dual-body architecture, segregating protective code from the operating system code to overcome the reliance of protective code on the host system. Subsequently, we assign corresponding weights to behaviors based on their impact on the system using information entropy theory, rendering the metric determination standards more rational. Next, a time window mechanism is designed to achieve a comprehensive trusted measurement of system behavior, addressing issues of trust decay and discontinuity in metric behavior. Finally, relevant experiments demonstrate that our scheme can achieve superior protective results.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Xianqun Han and Jianbiao Zhang "Behavior-based dynamic trusted measurement scheme", Proc. SPIE 13181, Third International Conference on Electronic Information Engineering, Big Data, and Computer Technology (EIBDCT 2024), 131811O (19 July 2024); https://doi.org/10.1117/12.3031239
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Computer security

Information security

Computing systems

Data modeling

Information theory

Matrices

Network security

RELATED CONTENT

Proactive malware detection
Proceedings of SPIE (June 18 2014)
Models of information security trend analysis
Proceedings of SPIE (August 14 2002)
A case of reliable remote functionality
Proceedings of SPIE (July 15 2008)
Overview of security access control mechanisms
Proceedings of SPIE (August 23 2023)

Back to Top