A note on distributed coordinated attacks
نویسنده
چکیده
In this paper, we describe a new class of highly distributed coordinated attacks and methods used for tracking down their sources. Search terms: Information Protection, Auditing, Trojan Horses, Distributed Computation, Coordinated Attacks, Distributed Coordinated Attacks Copyright c © 1996, Fred Cohen ALL RIGHTS RESERVED ‡ This research was funded by Management Analytics, PO Box 1480, Hudson, OH 44236, USA
منابع مشابه
HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کاملCOSSACK: Coordinated Suppression of Simultaneous Attacks
DDoS attacks are highly distributed, well coordinated, offensive assaults on services, hosts, and infrastructure of the Internet. Effective defensive countermeasures to DDoS attacks will require equally sophisticated, well coordinated, monitoring, analysis, and response. The Cossack project is developing an architecture to explore such coordination using multicast, annotated topology informatio...
متن کاملCARDS: A Distributed System for Detecting Coordinated Attacks
A major research problem in intrusion detection is the efficient Detection of coordinated attacks over large networks. Issues to be resolved include determining what data should be collected, which portion of the data should be analyzed, where the analysis of the data should take place, and how to correlate multi-source information. This paper proposes the architecture of a Coordinated Attack R...
متن کاملOptimal Coordinated Voltage Control in Distribution Networks in presence of Solar and Wind Power Plants Considering Uncertainties
Abstract: In the last decade, the amount of distributed generation connected to the distribution network is increasing. The presence of distributed generation resources in distribution systems has a great influence on its behavior and it is necessary to consider the impact of these resources on the distribution network design. In this study, Optimal Coordinated Voltage Control (OCVC) using wind...
متن کاملCoordinated Scan Detection
Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used by an adversary to obfuscate his incursion. In this paper we present an approach to detecting coordinated attacks that is based on adversary modeling of the desired information gain. A detection algorithm is developed that is based on solutions to the set covering problem, where we a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computers & Security
دوره 15 شماره
صفحات -
تاریخ انتشار 1996