Planning to Discover and Counteract Attacks
نویسندگان
چکیده
A major function of a security analyst is to analyze collected intelligence looking for plans, associated events, or other evidence that may identify an adversary’s intent. Armed with this knowledge, the analyst then develops potential responses (e.g., countermeasures) to deter the discovered plan or plans, weighs their strengths and weaknesses (e.g., collateral damage) and then makes a recommendation for action. Unfortunately, the collected intelligence is typically sparse and it is not possible for the analyst to initially discover the adversary’s specific intent. Under these circumstances, the analyst is forced to look at the range of possible plans/actions an adversary may take. The full range of potential attack scenarios is too rich to generate manually. Its complexity also bars direct analysis and evaluation of the potential impact of alternative actions and countermeasures. To address these issues, we are developing a set of tools that exhibit the following features/capabilities:
منابع مشابه
Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملAvoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots
Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...
متن کاملA Dynamic Current Mode Logic to Counteract Power Analysis Attacks
Since their publication in 1998, power analysis attacks have attracted significant attention within the cryptographic community. So far, they have been successfully applied to different kinds of implementations (e.g. smart cards, ASICs, FPGAs) of cryptographic algorithms. To protect such devices against power analysis attacks, it has been proposed to use a dynamic and differential logic style f...
متن کاملIn vitro Assessment of Adsorbents to Counteract Lead Toxicity in Ruminal Fermentation
An in vitro gas production technique was used to evaluate the effects of different adsorbents on the gas production parameters of lead-exposed diet. Ruminal fluid, obtained from fistulated sheep (3-4 years of age and 40±5 kg BW), and experimental diets samples, 200 ± 0.2 mg DM, were incubated in 100 mL glass bottles. To each bottle, one of the following treatments was applied: 1) control (no Pb...
متن کاملAnalysis of Automated Model against DDoS Attacks
Today Distributed Denial of Service (DDoS) attacks are causing major threat to perform online business over the Internet. Recently several schemes have been proposed on how to prevent some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. Our previous work proposed an automated model that deals with t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Informatica (Slovenia)
دوره 34 شماره
صفحات -
تاریخ انتشار 2010