Attacks on Web Based Software and Modelling Defence Mechanisms
نویسندگان
چکیده
منابع مشابه
Agent-based modelling and simulation of network cyber-attacks and cooperative defence mechanisms
The important problem in network security which solution is urgently needed is the investigation of counteraction between malefactors and defence systems in computer networks, including the Internet, and the creation of effective cyber-defence systems. It is important to underline that experienced malefactors realize sophisticated strategies of cyber-attacks. These strategies can include: Inf...
متن کاملSoftware-based Microarchitectural Attacks
Modern processors are highly optimized systems where every single cycle of computation time matters. Many optimizations depend on the data that is being processed. Software-based microarchitectural attacks exploit effects of these optimizations. Microarchitectural side-channel attacks leak secrets from cryptographic computations, from general purpose computations, or from the kernel. This leaka...
متن کاملFast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurID hash function [1]. They showed that vanishing differentials – collisions of the hash function – occur quite frequently, and that such differentials allow an attacker to recover the secret key in the token much faste...
متن کاملConcepts and Language Mechanisms in Software Modelling
Software is a complex artefact. Complexity can be reduced by abstraction and subsequent model formation. However, while current research proposes various concepts and techniques related to reducing complexity, the focus on the general notion of software modelling has been limited. The result is an unclarified role of models of software in relation to software development. This dissertation pres...
متن کاملStudy on Auto Detecting Defence Mechanisms against Application Layer Ddos Attacks in SIP Server
Denial of Service (DoS) or Distributed Denial of Service (DDoS) is a powerful attack which prevents the system from providing services to its legitimate users. Several approaches exist to filter network-level attacks, but application-level attacks are harder to detect at the firewall. Filtering at application level can be computationally expensive and difficult to scale, while still creating bo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of UbiComp
سال: 2012
ISSN: 0976-2213
DOI: 10.5121/iju.2012.3302