Next: Feustel, Mayfield: The DGSA:
Up: DARPA/NSA/DISA Joint Technology Office:
Previous: Network-Operating System Interaction
In the last section of the paper, the authors discuss several ways to
prevent and detect intruders. A secure system needs to collect data
and to offer mechanisms to analyze data about the running system.
This includes logging all kind of important information. For such
analysis to be trustworthy, it must be impossible for an intruder to
deactivate the mechanisms or to change the collected data.
Furthermore, the audit process must be easy to use and efficient.
The authors also talk about the research of operating systems
themselves. They argue that it is expensive and takes a long time to
research new concepts of operating systems. Therefore, an
infrastructure has to be created that allows early, rapid, and
accurate analysis of the benefits and consequences of innovative
operating system concepts.