Identification of host audit data to detect attacks on low-level IP vulnerabilities

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identification of Host Audit Data to Detect Attacks on Low-level IP Vulnerabilities

Conventional host-based and network-based intrusion and misuse detection systems have concentrated on detecting network-based and internal attacks, but little work has addressed host-based detection of low-level network attacks. A major reason for this is the misuse detection system’s dependence on audit data and the absence of low-level network data in audit trails. This work defines low-level...

متن کامل

Survey Of DDoS Attacks Based On TCP/IP Protocol Vulnerabilities

Distributed denial-of-service (DDoS) attacks are one of the key threats and perhaps the toughest security problem for today’s Internet.Distributed Denial of Service (DDoS) attack has become a stimulating problem to the availability of resources in computer networks.With brief or no advance warning, a DDoS attack can easily drain the computing and communication resources of its victim within a s...

متن کامل

Algebraic Matching of Vulnerabilities in a Low-Level Code

This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques...

متن کامل

Mining IP to Domain Name Interactions to Detect DNS Flood Attacks on Recursive DNS Servers

The Domain Name System (DNS) is a critical infrastructure of any network, and, not surprisingly a common target of cybercrime. There are numerous works that analyse higher level DNS traffic to detect anomalies in the DNS or any other network service. By contrast, few efforts have been made to study and protect the recursive DNS level. In this paper, we introduce a novel abstraction of the recur...

متن کامل

Unique Vulnerabilities and Attacks on Cellular Data Packet Services

As cellular data services and applications are being widely deployed, they become attractive targets for attackers, who could exploit unique vulnerabilities in cellular networks, mobile devices, and the interaction between cellular data networks and the Internet. Furthermore, mobile devices, often times considered to be part of the cellular network’s trusted computing base (TCB), are becoming m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Security

سال: 1999

ISSN: 1875-8924,0926-227X

DOI: 10.3233/jcs-1999-7102