Distributed Architecture to Enhance Systems Protection against Unauthorized Activity via USB Devices
نویسندگان
چکیده
Cyberattacks exploiting Universal Serial Bus (USB) interfaces may have a high impact on individual and corporate systems. The BadUSB is an attack where USB device’s firmware spoofed and, once mounted, allows attackers to execute set of malicious actions in target system. countermeasures against this type can be grouped into two strategies: phyiscal blocking ports software blocking. This paper proposes distributed architecture that uses enhance system protection attacks. composed multiple agents external databases, it designed for personal or computers using Microsoft Windows Operating System. When device connected, the agent inspects device, provides filtered information about its functionality presents threat assessment user, based all previous user choices stored databases. By providing valuable also assessments from users, proposed improves protection.
منابع مشابه
Implementation of Concurrent Access to File Systems in USB Devices
The combination of a removable storage device with a communication channel and a computation node is a common architectural theme in many system-on-chip (SOC) designs. The systems in which many of these devices are placed produce or consume digital media content from their removable storage devices, which are formatted with industrystandard file systems. When the communication channel is USB, t...
متن کاملProviding a protection method to support distributed generation against transient voltage instability
The analysis of transient stability in electric power systems and the penetration coefficient of scattered productions play important roles in the regulation of protective equipment, so these parameters should be considered two main factors in the electrical protection of power networks. Overcurrent relays are used as one of the simplest and most effective solutions for power system protection....
متن کاملProposing an Efficient Software-based Method to Enhance Reliability of Computer Systems against Soft Errors
In recent years, along with rapid developments in technology, computer systems haveincreasingly become more integrated and more modular. Indeed, the reliability and efficiency ofcomputer systems are of high significance. Hence, the quantitative evaluation of the optimizationof reliability indexes in computer systems is considered to be a crucial issue. Reliabilityenhancement of computer systems...
متن کاملExtensions to the Emergency Services Architecture for Dealing With Unauthenticated and Unauthorized Devices
This document provides a problem statement, introduces terminology, and describes an extension for the base IETF emergency services architecture to address cases where an emergency caller is not authenticated, has no identifiable service provider, or has no remaining credit with which to pay for access to the network.
متن کاملUSBWall: A novel security mechanism to protect against maliciously reprogrammed USB devices
Universal Serial Bus (USB) is a popular choice of interfacing computer systems with peripherals. With the increasing support of modern operating systems, it is now truly plug-and-play for most USB devices. However, this great convenience comes with a risk that can allow a device to perform arbitrary actions at any time while it is connected. Researchers have confirmed that a simple USB device s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Sensor and Actuator Networks
سال: 2021
ISSN: ['2224-2708']
DOI: https://doi.org/10.3390/jsan10010019