Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This study focuses on the spatial context of hacking to networks of Honey-pots. We investigate the relationship between topological positions and geographic positions of victimized computers and system trespassers. We've deployed research Honeypots on the computer networks of two academic institutions, collected information on successful brute force attacks (BFA) and system trespassing events (sessions),...
An interesting new trend pertaining to application-layer DDoS is the so-called ‘bot-less’ attack execution, in which — instead of a network of compromised computers (i.e., a network of bots/zombies) — the browsers of legitimate/non-infected computers are manipulated into generating the attack traffic. In this paper, we give an overview of two different forms of ‘bot-less’ application-layer DDoS attacks...
Distributed Denial of Service (DDoS) attacks are a serious threat to network security. Servers of many companies and/or governments have been victims of such attacks. DDoS attacks jam the network service of the target using multiple bots hijacked by crackers and send numerous packets to the target server. In such an attack, detecting the crackers is extremely difficult, because they only send a command...
Kaminsky cache poisoning is arguably the most prominent and dangerous attack to DNS especially when DNSSEC is still on its way to global deployment. This paper investigates the choice space of Kaminsky cache poisoning attackers. Based on the maximum-efficiency attack model, critical parameters as well as their impacts on cache poisoning are thoroughly studied. In theory, Kaminsky cache poisoning attackers...
Providing enhanced security is an important design objective of many future Internet architectures. In this paper, we propose a dynamic path identifier (D-PID) mechanism for a recently proposed future Internet architecture called CoLoR. The D-PID mechanism can efficiently enhance the security of the network by periodically changing the path identifiers (PIDs) between domains, which are used for inter-domain...
DDoS flooding attack is one of the top threats to the Internet. However, due to the fast development of the Internet, current detection algorithms are already inadequate to meet the growth of network traffic. In this paper, we propose a lightweight algorithm. We first observe the real Internet traffic, and find that flows of DDoS flooding attack traffic are persistent and synchronous while most flows...
The naming service provided by Domain Name System (DNS) is essential for locating resources on the Internet, for distributing security mechanisms in an authenticated manner, and for facilitating future applications. Unfortunately, despite the critical function that the naming service of the DNS infrastructure fulfills, it is extremely vulnerable to domain hijacking attacks. While most of the attacks...
A simple Denial-of-Service (DoS) attack is ICMP flooding, i.e. overwhelming the victim with ICMP Echo Request packets: by soliciting ICMP Echo Reply responses, the attacker aims at consuming CPU cycles as well as incoming and outgoing bandwidth of the victim. In this work, we present an evolution of this basic attack, we named Greenhouse Effect Attack (GEA): the attacker issues exactly the same amount...
This paper addresses three social engineering techniques that vigilante online communities of scambaitersuse for 'Inbox diving': an act of gaining access to internet scammers email accounts. The methods have been gathered by analyzing scam baiting forums and were put on the test in direct email exchange between the author and Internet scammers. By diving into the scammers inboxes, their working methods...
The objective of Malicious Remote Code Execution Exploits is to remotely execute code transparently to the user, and without relying on user interaction, in order to infect targeted machines. This comparative study examines the effectiveness of different proactive exploit mitigation technologies included in popular endpoint security products and specialized anti-exploit tools. The study focuses on...
We introduce IP Fast Hopping, easily deployable network-layer software solution against DDoS attacks. Our approach enhances server's SDN environment by providing an easy way for SDN controllers to protect servers against DDoS attacks and traffic interception by hiding of these servers behind a set of physical network switches.
Network monitoring system is an important task for network administrator to monitor states of the operation of network devices, servers, network services, or network traffics. This task is often solved by setting-up a monitoring server and implement agents at monitored objects. This paper presents a solution to monitor Hot-IPs in high speed network at ISP side. It does not need to specify which objects...
In order to detect and prevent DoS/DDoS attacks that exploit IP address spoofing, the IP traceback technique has been introduced and developed with variety of methods including packet marking. By means of inserting marking information on the travel path into rarely used fields in the header of IP packets, the destination host can trace back the original-source location of received packets, which is...
Tor is a popular 'darknet', a network that aims to conceal its users' identities and online activities. Darknets are composed of host machines that cannot be accessed by conventional means, which is why the content they host is typically not indexed by traditional search engines like Google and Bing. On Tor, web content and other types of services can anonymously be made available as so-called hidden...
Distributed Denial of Service (DDoS) attacks remain among the most dangerous and noticeable attacks on the Internet. Differently from previous attacks, many recent DDoS attacks have not been carried out over the network layer, but over the application layer. The main difference is that in the latter, an attacker can target a particular application of the server, while leaving the remaining applications...
Cloud Computing has recently emerged as a computing paradigm for delivering IT resources as services over the internet. However, there still exist significant problems with regard to secure delivery of services using Cloud-based IT resources. As long as malicious virtual machines could affect its host and other machines, the virtual machine placement is an important issues. In this paper, we outline...
Cyberstalking has many new manifestations with the opportunities offered by modern technology. It is a growing issue that presents significant distress to its victims. This type of crime presents difficulty to computer forensic investigators in large amounts of digital evidence accumulated over time and in offender apprehension. There is currently little research in the profiling the cyberstalker...
Network traffic intrusions increase day by day in computer systems. This poses major security threats to computer networks. In this paper, we present an effective approach for anomaly detection in network traffic. We investigate the long-range dependence (LRD) behavior of decomposed network traffic subgroups in different directions with respect the enterprise network. If the network traffic exhibits...
Today's evolving cyber security threats demand new, modern, and cognitive computing approaches to network security systems. In the early years of the Internet, a simple packet inspection firewall was adequate to stop the then-contemporary attacks, such as Denial of Service (DoS), ports scans, and phishing. Since then, DoS has evolved to include Distributed Denial of Service (DDoS) attacks, especially...
IP traceback to the origin of denial of service (DoS) attack is extremely hard and most existing methods such as marking and logging based approaches are not practical and need changes in infrastructure. The flow-based IP traceback is a new approach which can use the advantages of metaheuristic algorithms. In this paper, a bee colony algorithm is applied to find the DoS attack source. The traffic...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.