Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices

نویسندگان

چکیده

Cyberattacks exploiting Universal Serial Bus (USB) interfaces may have a high impact on individual and corporate systems. The BadUSB is an attack where USB device’s firmware spoofed and, once mounted, allows attackers to execute set of malicious actions in target system. countermeasures against this type can be grouped into two strategies: phyiscal blocking ports software blocking. This paper proposes distributed architecture that uses enhance system protection attacks. composed multiple agents external databases, it designed for personal or computers using Microsoft Windows Operating System. When device connected, the agent inspects device, provides filtered information about its functionality presents threat assessment user, based all previous user choices stored databases. By providing valuable also assessments from users, proposed improves protection.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Implementation of Concurrent Access to File Systems in USB Devices

The combination of a removable storage device with a communication channel and a computation node is a common architectural theme in many system-on-chip (SOC) designs. The systems in which many of these devices are placed produce or consume digital media content from their removable storage devices, which are formatted with industrystandard file systems. When the communication channel is USB, t...

متن کامل

Providing a protection method to support distributed generation against transient voltage instability

The analysis of transient stability in electric power systems and the penetration coefficient of scattered productions play important roles in the regulation of protective equipment, so these parameters should be considered two main factors in the electrical protection of power networks. Overcurrent relays are used as one of the simplest and most effective solutions for power system protection....

متن کامل

Proposing an Efficient Software-based Method to Enhance Reliability of Computer Systems against Soft Errors

In recent years, along with rapid developments in technology, computer systems haveincreasingly become more integrated and more modular. Indeed, the reliability and efficiency ofcomputer systems are of high significance. Hence, the quantitative evaluation of the optimizationof reliability indexes in computer systems is considered to be a crucial issue. Reliabilityenhancement of computer systems...

متن کامل

Extensions to the Emergency Services Architecture for Dealing With Unauthenticated and Unauthorized Devices

This document provides a problem statement, introduces terminology, and describes an extension for the base IETF emergency services architecture to address cases where an emergency caller is not authenticated, has no identifiable service provider, or has no remaining credit with which to pay for access to the network.

متن کامل

USBWall: A novel security mechanism to protect against maliciously reprogrammed USB devices

Universal Serial Bus (USB) is a popular choice of interfacing computer systems with peripherals. With the increasing support of modern operating systems, it is now truly plug-and-play for most USB devices. However, this great convenience comes with a risk that can allow a device to perform arbitrary actions at any time while it is connected. Researchers have confirmed that a simple USB device s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Sensor and Actuator Networks

سال: 2021

ISSN: ['2224-2708']

DOI: https://doi.org/10.3390/jsan10010019