An Approach against a Computer Worm Attack

Size: px
Start display at page:

Download "An Approach against a Computer Worm Attack"

Transcription

1 48 An Approach against a Computer Worm Attack Ossama Toutonji and Seong-Moo Yoo University of Alabama in untsville, Department of Electrical and Computer Engineering, untsville, Alabama 35899, USA {toutono; yoos}@eng.uah.edu Abstract: Building a realistic model for a network defense system against a worm attack is vital to better understand the effects of a worm attack on network assets and functionality. Traditional epidemic worm modeling does not take into consideration the real network topology or network actual defense measures. In this paper, we reviewed the network defense systems from different perspectives for defining the level of immunity of different parts of the network and ascertaining the real impact of a worm attack on the network. The idea of immunity came from examining and comparing the immune system in the human body to the defense and security measures of computer networks. Then, we developed a novel, realistic model by splitting the network into the highly immune part of the network (I) and the partially immune part of the network (I) in order to measure the real impact of worm attack on computer network. ext, we evaluated the effectiveness of this model by implementing network defense measurements adopted from the human immune system. Computer simulations show that the infection waves of worms in I have minimal impacts compared to those in the I. Keywords: epidemic worm modeling, highly immune part of the network (I), human immune system, partially immune part of network (I), worm attack. 1. Introduction Worm attack [1, 2, 7, 9, 17, 18, 20, 21, 22] still poses an enormous threat to network security. A destructive, automated, and self replicated behavior of a worm causes bandwih consumption and corrupt network performance. The design of worm code could go beyond the intention to propagate through the network. A malicious code could be built to delete executable files on the attacked machine, create a backdoor listener, and cause a denial-of-service attack. Generally, a worm is categorized according to the way it propagates, installs or lunches. A worm could spread through s, instant messages, internet relay chat, and file sharing. Burckhar [4] proposed a virtual reality modeling of infectious diseases in the human population. The model took into consideration several important factors including; the level of contact between individuals and the duration of immunity in the graveyard stage, which considers the fact that individuals who lack immunity in the recovery state will move back to a stage of susceptibility. Burckhar s research suggested new ways to reduce widespread infection by using quarantine and treatment in the human population as a future study [3], [4]. Kim and Bentley explored the similarity between the human immune system, network intrusion detection systems and the possibilities of emulating the human immune system, to design a novel network-based intrusion detection system [5]. Castaneda et al. proposed a new method that generates an anti-worm after detecting and recognizing the payload of the malicious worm. The results showed the effects of implementing anti-worms with respective propagation schemes and the limitation of antiworms in practical implementations [6]. These worm models assume that all hosts in the network have the same probability to become infected by worms, and; therefore, the same level of vulnerability when it comes to worm attack. Consequently, the results will lead to an unrealistic prediction of the infection wave. This paper represents new approaches to modeling a worm attack on a computer network; the study took into consideration the pre-existing conditions in different parts of network topology. We reviewed the network from a network security prospective where different parts of the network have different levels of defense and immunity measures. The idea of immunity came from examining and comparing the immune system in the human body to the defense and security measures of computer networks [13], [14], [15], [16]. Then, we developed a novel realistic model by splitting the network into the highly immune part of the network (I) and the partially immune part of the network (I) in order to measure the real impact of a worm attack on a computer network. ext, we evaluated the effectiveness of this model by implementing network defense measurements adopted from the human immune system. Computer simulations show that the infection waves of worms in I have minimal impacts compared to I. This paper is organized as follows: section 2 contains a detailed description of the similarity between the human immune system and a computer network defense system. In this section, we defined the human immune system and we adopt the same concept to invent a new definition for computer network immunity. Section 3 summarizes existing epidemic modeling used as tools for modeling worm attacks on computer networks. In section 4, we present the theoretical and the mathematical approaches for our new realistic epidemic worm modeling epidemic model. The last section includes the conclusion and possibilities for future research. 2. Similarity between the uman Immune System and etwork Defense System In the human body, the immune system is a constellation of responses to outside attacks on the human body [6]. The general population represents a network of individuals that interact with each other. The medical measures taken by a community in general and locally by individuals represent the defense system of human beings against the spread of disease. There are three types of immunity in the human

2 49 body: active immunity, passive immunity, and hybrid immunity. 1) Active uman Immunity is acquired from previous viral infections. When an antigen infects the body, it triggers the immune system to develop antibodies from plasma cells found in the bone marrow. lasma cells will generate B-cells that synthesize antibody molecules. These antibody molecules bind to the antigens and destroy them. The body will keep a copy of all generated antibodies in the immunologic memory to defend against future identical viral infections. 2) assive uman Immunity is acquired from vaccination. The antibody will be transferred from an actively immunized individual to a susceptible individual and will work only for a specific type of virus. 3) ybrid uman Immunity is acquired from using Monoclonal antibody cells (ybridmas) produced in a medical laboratory used to treat more complex and serious illnesses. ybridmas are hybrid cells produced by fusing myeloma cells with the spleen cells from animals such as mice or rabbits that have been immunized from the desired antigen. The main purpose is to stimulate the patient's immune system to fight tumor cells and to prevent tumor growth by blocking specific cell receptors. By comparison, active immunity is longer-lasting and more effective than passive immunity due to the immunologic memory produced by the patient s own immune system. assive immunity is produced outside the body and then implanted inside the patient. ybrid immunity is a combination of both active and passive immunity. It is both a vaccine and a stimulus which combine the characteristics of both active and passive immune systems. etwork immunity consists of network security processes and defense measures that have been implemented to defend the network against inside or outside attacks. It is the software and the hardware security steps taken to secure network infrastructure [3]. Some key characters of human immunity are similar to network immunity. A computer network has similar active, passive, and hybrid defense systems. We will illustrate the three different types of immunity in computer networks and show the similarity and differences between network immunity and the human immune system. 1)-Active etwork Immunity is established by using an effective intrusion detection system (IDS) and safe ethical worms. The (IDS) monitors network traffic and blocks suspicious activities by detecting known malicious codes. In 2004, F. Castaneda et. al proposed an automated method to detect worm attack, analyze the worm s malicious code, and then generate an anti-worm. The generated anti-worm, or ethical worm, has the same self-replication behavior as the bad worm. The ethical worm will spread through the network and overcome the bad worm. Most network security experts still oppose the idea of using ethical worms due to the fact that they could unintentionally cause a denial-of-service attack by breaking applications or consuming network bandwih, or they could be used by hackers as a tool for a new vulnerability. Both active human immunity and active network immunity have a memory of invaders identities that will help identify an attacker, but the main difference is that active human immunity is dynamically capable of developing immunity for new antigens where (IDS), or safe ethical worms, are only capable of identifying previously known malicious codes. Building a complete active immune system that generates safe ethical worms against newly invented worms is still in ongoing research. 2)-assive etwork Immunity is established by installing antivirus software, downloading the required update patches, configuring a firewall system, and blocking arbitrary outbound connections [10]. In both passive human immunity and passive network immunity, the required immunity must be transferred to the target system. 3)-ybrid etwork Immunity is established by combining both passive and active immunity. Both hybrid human immunity and hybrid network immunity are capable of dealing with more complex and serious invaders. Like the hybrid human immunity, the combined immunity in a hybrid network is capable of defending against a wider range of network attacks. By analyzing network infrastructure from a security defense perspective, network immunity levels vary depending on the network security steps that have been taken in different sections of the network. The steps needed to achieve and maintain a secure network can be summarized as follows: 1) Assessment: a technical evaluation of network security and defense systems; includes an organization s policies, procedures, laws, regulations, budgeting, and other managerial duties [3]. 2) rotection: previously established defense countermeasures to prevent network attacks. 3) Detection: process for identifying intrusion. 4) Response: measures that will be taken to overcome new attacks. From the above-mentioned steps; we may split a network into two parts: a) ighly immune part of the network (I): here all network security defense measures have been implemented. b) artially immune part of the network (I): here, the network is either missing at least one security measure or at least one of the measures has not been fully implemented. To determine the true impact of a worm attack on network functionality, we took into consideration our network categories and used different values for our model parameters. Our aim is to develop a new realistic approach to worm modeling. The results gave us a close look at the widespread behavior of worms in different parts of the network and the future strategic measures that need to be taken to fight the impact of destructive worm attacks against networks. Our model was based on the epidemic model in which a host that lacks immunity may return to the susceptible stage, therefore remaining vulnerable to worm attack and possibly becoming re-infected. We built our assumptions on a factual network and defense measurements that are usually performed by information assurance engineers. In a real functional network, the model s parameters vary depending

3 50 on the level of immunity. In I, the probability of worm infection is higher than in I, which will lead to higher infection rate. The removal rate is smaller due to a higher number of recovered hosts in I compared to I. We also experienced that the number of hosts moved back to the susceptible stage in I is higher when compared to I. Based on these observations, we claim that in more realistic worm attack modeling, various model parameters must be used for different parts of the network that have disparate levels of defense, immunity, and monitoring. 3. Existing Epidemic Models In this section, we will summarize the basic epidemic models [4], [8], [11], [12], [19] that have been used to model a worm attack on computer networks. Table 1 shows a list of notation and symbols that have been used to develop the set of differential equations in this section for the basic epidemic models. 3.1 Kermack-McKendrick (KM) model The KM model [8] is an epidemiological model with three main elements: a) Susceptible hosts: hosts which are vulnerable to worm attack. b) Infectious hosts: hosts infected by worms. c) Removed hosts: hosts which have recovered from an attack and are immune to future infection. This model is considered an SIR (Susceptible, Infectious, and Removed) model. The hosts in this type of modeling could be in any one of the three states: Susceptible (S), Infectious (I), or Removal (R). The model builds on the assumption that the population size is fixed (no births or deaths) and the population is homogenously mixed. A set of nonlinear differential equations describes the change in the population for the different types of hosts. Equations (1-4) describe the KM epidemic model: By rearranging equation (2): ds( t) = β ( t) I ( t) S( t) (1) di ( t) = β ( t) I( t) S( t) γ I ( t) (2) dr( t) = γ I ( t) (3) S( t) + I ( t) + R( t) = (4) di( t) = I ( t)( β ( t) S( t) γ ) (5) From (5), we conclude that S0 > γ / β should be satisfied to cause epidemic growth. Where S0 is the initial number of susceptible hosts, ρ = γ / β represents the epidemic threshold and φ = γs0 / β represents the basic reproduction number of the infection, and φ > 1 will cause the infectious population to grow. Figure 1 shows a state transition of the KM model. Table 1. otations and initial values of the model used in Section 3 otation Susceptible Infectious Removal 3.2 SIRS model Explanation I(t) umber of infectious hosts at S(t) umber of susceptible hosts at R(T) umber of removed hosts at Size of total vulnerable population β Infection rate µ Re-susceptible rate on a removed host ρ γ φ Epidemic threshold Removal rate Reproduction number of infection Figure 1. Kermack-McKendrick epidemic model. In the SIRS model [4], there is a state in which the removed host could lose immunity and move back to the susceptible stage. The model is governed by the following set of nonlinear differential equations: ds( t) = β ( t) I ( t) S( t) + µ R( t) (6) di ( t) = β ( t) I( t) S( t) γ I ( t) (7) dr( t) = γ I ( t) µ R( t) (8) The SIRS model has the same initial conditions as the SIR model regarding a fixed number of hosts and the threshold value criteria. Figure 2 shows a block diagram of SIRS model. Susceptible Infectious Removal Figure 2. SIRS epidemic model 4. roposed Computer etwork Realistic Model The similarity in the behavior between the spread of infection in a human population and the self-replication of a worm in a network environment makes modeling worm attacks on computer networks similar to modeling the spread of viral infection in a human population. The level of immunity in a computer network determines the impact of a worm attack on the computer network. In realistic worm modeling, a network has various levels of immunity. The susceptible population is divided into two groups: the highly immune population and partially immune population. Disparate types of susceptible hosts will behave differently when confronted with a worm attack.

4 51 The level of immunity in the susceptible hosts will determine the infection rate, the recovery rate and the re-susceptibility rate of the epidemic model. We examined the value of these rates depending on the network immunity level by looking at the main factors that cause changes in these rates. In doing so, we made a detailed comparison between a human population and a computer network. Table 2 shows a list of notations and symbols that we used in this section. 1) Infection rate: In a human population, the infection rate involves major parameters which include the contact rate between humans (θ, human/time), the proportion of infection in the population (I / ), and the transmission infection probability (η). Since we are interested in the interaction Table 2. otations and initial values of the proposed model otation Explanation Initial value Ip(t) umber of infectious hosts in I at time Ip(0)=1 t I(t) umber of infectious hosts in I at time I(0)=1 t Sp(t) umber of susceptible hosts in I at Sp(0)=350,000 S(t) umber of susceptible hosts in I at S(0)=650,00 0 Rp(t) umber of removed hosts from I at Rp(t)=0 R(t) umber of removed hosts from I at R(0)=0 θ Contact rate of I 2 θ Contact rate of I 2 η Transmission infection probability for I 1 η Transmission infection probability for 0.25 I λ Recovery rate of infectious I 0.1 λ Recovery rate of infectious I 0.25 µ Re-susceptible rate of I 0.01 µ Re-susceptible rate of I 5 * 10-6 I(t) Total number of infectious hosts at I(0)=2 Total number of hosts 1,000,000 between susceptible hosts and the infectious hosts, we defined the force of infection as (θ η I / ). The change in the number of susceptible hosts is represented by the equation: ds( t) I = θ η S (9) By adopting the infection parameters in a human population to a network environment, we assumed that hosts in both (I) and (I) have the same contact rate, and any host in the network will contact the same number of infectious hosts. In (I), more hosts will move from the susceptible stage to the infectious stage due to a lack of immunity, leading to a higher rate of infection. 2) Recovery rate: the recovery rate in a human population depends on the period of infection. The recovery rate for k days infection is proportional to 1/k. In a network environment, the recovery rate varies depending on the level of immunity. 3) Re-susceptibility rate: in a human population, the number of people who move from the recovery stage back to the susceptible stage varies depending on the level of immunity in the community. aving more people immunized against widespread viral infection forecasts a small resusceptibility rate and vice-versa. In a network environment, the same concept could be applied; Figure 3 shows a realistic SIRS modeling of a worm attack on computer network. The changes in the number of susceptible, infectious, and removed hosts for the (I) and (I) could be described by the following set of differential equations: Susceptible (I) FS(t) Infectious (I) λi(t) Recovery (I) µr(t)+µr(t) Susceptible (I) FS(t) Infectious (I) λi(t) Recovery (I) 1) The set of differential equations for I: dsp( t) I ( t) = θ p η p S( t) prp + µ ( t) (10) dip( t) I ( t) = θ p η p Sp( t) pip + λ ( t) (11) drp( t) = λ pip( t) µ prp( t) (12) I ( t) Fp = θ p η p (13) 0p θ p η p R = λ p+ µ (14) p ere, Fp represents the force of infection in the I population, R0 represents the basic reproductive rate for the I population, and it satisfies the condition R0 > 1 for the epidemic to grow. 2) The set of differential equations for I: S I R Figure 3. roposed worm attack model. ds( t) I ( t) = θ η S( t) R + µ ( t) (15) di( t) I ( t) = θ η S( t) I + λ ( t) (16)

5 52 dr( t) = λ I( t) µ R( t) (17) I ( t) F = θ η (18) 0 R θ η = λ + µ (19) ere, F represents the force of infection in I population, R0 represents the basic reproductive rate for the I population, and it satisfies the condition R0 > 1 for the epidemic to grow. ow, = Sp( t) + I( t) + Rp( t) + S( t) + I( t) + R( t) (20) 5. Simulation To identify the realistic effects of a worm attack on a computer network, we simulated our model by using realistic sets of parameters that emphasize the different level of immunity in the network. Then, we used fixed sets of parameters for the entire network. We also examined the relationship between mitigation technique factors, modeling parameters and the effects of changing these parameters on worm propagation. The results shows, as expected, that the number of infectious hosts in I is higher than I even though the number of I s population is bigger than the I s population due to better defense and security measurements in I. B - Comparison between Traditional and Realistic Worm Modeling: To identify the realistic effects of a worm attack on a computer network, we ran our model in three different scenarios. First, we simulated our proposed model, R-SIRS, by considering both I and I parameters. Then we simulated the SIRS model separately in I then in I parameters. The solid line represents the R-SIRS model. Tp-SIRS represents a traditional SIRS model in I parameters. Th-SIRS represents the traditional SIRS model in I parameters. Figure 5 shows a comparison of R-SIRS, Tp-SIRS, and Th-SIRS models. A Effects of a worm attack on I and I populations: Figure 4 shows a SIRS model simulation for both I and I. Figure 5. Comparison between R-SIRS, Tr-SIRS, Th-SIRS models Figure 4. SIRS model for I and I In the model, 35% of the susceptible population is partially immune and 65% is highly immune. The probability of infection and the recovery rate for both the I and I have been set as follows: a) For I, the infection probability is 1, all hosts will get infected, and the recovery rate is 0.1; b) For I, the probability of infection is 0.25, and the recovery rate is Both I and I hosts will experience the same interaction with infectious hosts throughout the simulation so they have the same contact rate. The results show that using unrealistic traditional worm modeling will yield an incorrect estimate of worm infection. From the figure, Tp-SIRS and Th-SIRS infectious populations are different from the R-SIRS model. The number of infectious hosts in the R-SIRS model stands between Tp-SIRS and Th-SIRS infectious populations. The R-SIRS model gives us the real impact of a worm attack on a computer network. C- The effect of changing the contact rate in the R-SIRS model: Quarantine of infected patients is one measure of preventing widespread disease in a human population by decreasing the level of contact between infected and healthy individuals, and thereby reducing the number of infectious individuals in the human population. We apply the same concept to a network environment by using quarantine as a defense technique to reduce the level of worm infection. We simulated the R-SIRS model for four different values of contact rate (2, 3, 4, and 5).

6 53 Figure 6. Effect of contact rate The result in Figure 6 shows that the infectious population decreases by decreasing the contact rate. D- The effect of changing the probability of infection in the R-SIRS model: In a human population, vaccination is used to decrease the rate of infection due to the reduction in the probability of infection. Similarly, adding security measures to network assets will enhance the defensive measures of the network against worm attack and decrease the probability of worm infection in a computer network. To examine the realistic impact of adding new mitigation to a network environment, we simulated the R-SIRS model using four different values of infection probability (0.25, 0.35, 0.5, and 1). Figure 7 shows the effect of reducing the probability of infection of worm attack by adding more security measures to the network. The result shows that the number of infectious populations declines when the probability of infection decreases. Figure 7. Effect of probability of infection 6. Conclusion This paper presents a new approach to modeling a worm attack on a computer network by using the R-SIRS model. We built our R-SIRS model by emulating the human immune system in a network environment. Building worm attack models by using the same capability of the human body to overcome virus infection is a major step in constructing the necessary network defense system against current and future worm attacks. Our simulation results show that worm infection has disparate impacts on different parts of the network based on different levels of immunity. By adding new mitigation techniques to enhance network security we are changing the model parameters to discover the real impact of a worm attack on network infrastructure. Using traditional modeling of a worm attack on a computer network without studying network immunization topology may lead to underestimation of the security measures needed to defend network security assets. In future research, we would benefit from the similarity between the human immune system and computer network defense measures. We are going to lunch more detailed comparisons toward building ultimate ways to defend the network against worm attacks and test the impact of worm attack on computer networks. References [1] Li, M. Salour, and X. Su, A Survey of Internet Worm Detection and Containment, IEEE Communications Surveys & Tutorials, vol. 10, no. 1, pp , 1 st quarter, [2] D. Moore, C. Shannon, and J. Brown, Code Red: a Case Study on the Spread and Victims of an Internet Worm, roc. 2 nd ACM SIGCOMM Workshop on Internet Measurement, Marseille, France, ov [3] rotecting the Military Cyber Space: DARA Gears to Counter etwork Worms: website: [4] F. Burckhar, Modeling Infections Deceases in Virtual Realties. [5] J. Kim, S. Radhakrishnan, S. K. Dhall Measurement and Analysis of Worm ropagation on Internet etwork Topology, roc. IEEE 13 th Intl l Conf. on Computer Communications and etworks (ICCC 04), Chicago, 2004, pp [6] J. Kim,. Bentley The uman Immune System and etwork Intrusion Detection, roc. 7 th European Conf. on Intelligent Techniques and Soft Computing (EUFIT 99). [7] F. Castaneda, E.C. Sezer, and J. Xu, Worm vs. Worm: reliminary Study of an Active Counter-Attack Mechanism, roc ACM Workshop on Rapid Malcode (WORM 04), pp , Washington, DC, Oct [8] C.C. Zou, W. Gong, and D. Towsley, Code Red Worm ropagation Modeling and Analysis, 9 th ACM Symp. on Computer and Communication Security, pp , Washington DC, 2002 [9] D. Moore, V. axson, S. Savage, C. Shannon, S. Staniford,, and. Weaver, Inside the Slammer Worm, IEEE Magazine of Security and rivacy, vol. 1, no. 4, pp , [10] Ed. Skoudis, Malware, Fighting Malicious Code. Saddle River, J,earson, 2004.

7 54 [11] D. J. Daley and J. Gani, Epidemic Modeling: An Introduction, Cambridge, Studies in Mathematical Biology, [12] J. Kim, S. Radhakrishnan, and S.K. Dhall, Measurement and Analysis of Worm ropagation on Internet etwork Topology, roc. Int l Conf. on Computer Communications and etworks (ICCC 04), pp , Chicago, Oct [13] J. Li and. Knickerbocker, Functional Similarities between Computer Worms and Biological athogens, Computers & Security, 26 (2007), pp [14] Y. Yang, S. Zhu, and G. Cao, Improving Sensor etwork Immunity under Worm Attacks: a Software Diversity Approach, ACM Int l Symp. on Mobile Ad oc etworking and Computing (Mobioc 08), ong Kong, pp , May [15] U.S. Department of ealth and uman Services ational Institutes of ealth Understanding the Immune System ow It Works, I ublication o Sep [16] S. eng, Y. Li, and B. Zheng, States and Critical Behavior of Epidemic Spreading on Complex etworks, 7 th World Congress on Intelligent Control and Automation, Chongqing, China, pp , June [17] J. Kim, S. Radhakrishana, and J. Jang, Cost Optimization in SIS Model of Worm Infection, ETRI Journal, vol. 28, no. 5, pp , Oct [18] X. Yan, and Y. Zou, Optimal Internet Worm Treatment Strategy Based on the Two-Factor Model, ETRI Journal, vol. 30, no. 1, pp , Feb [19] Z. Jin and M. aque, The SIS Epidemic Model with Impulsive Effects, 8th ACIS Int l Conf. on Software Engineering, Artificial Intelligence, etworking, and arallel/distributed Computing (SD 2007), Qingdao, China, vol. 3, pp , July [20]. Zhou, Y. Wen, and. Zhao, assive Worm ropagation Modeling and Analysis, roc. IEEE Int l Conf. on Computing in the Global Information Technology, Guadelope, French Caribbean, pp. 32, Mar [21]. Zhou, Y. Wen, and. Zhao, Modeling and Analysis of Active Benign Worms and ybrid Benign Worms Containing the Spread of Worms, roc. IEEE Int l Conf. on etworking (IC'07), [22] O. Toutonji and S. M. Yoo, assive Benign Worm ropagation Modeling with Dynamic Quarantine Defense, KSII Transactions on Internet and information System vol. 3, no. 1, pp , Feb

The Effect of Infection Time on Internet Worm Propagation

The Effect of Infection Time on Internet Worm Propagation The Effect of Infection Time on Internet Worm Propagation Erika Rice The Effect of Infection Time oninternet Worm Propagation p 1 Background Worms are self propagating programs that spread over a network,

More information

Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS)

Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS) Understanding the Behavior of Internet Worm through PArallel Worm Simulator (PAWS) Tiffany Tachibana Computer Science and lnformation Technology California State University, Monteray Bay [email protected]

More information

Intelligent Worms: Searching for Preys

Intelligent Worms: Searching for Preys Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School

More information

The Body s Defenses CHAPTER 24

The Body s Defenses CHAPTER 24 CHAPTER 24 The Body s Defenses PowerPoint Lectures for Essential Biology, Third Edition Neil Campbell, Jane Reece, and Eric Simon Essential Biology with Physiology, Second Edition Neil Campbell, Jane Reece,

More information

What are Viruses, Trojans, Worms & Spyware:

What are Viruses, Trojans, Worms & Spyware: What are Viruses, Trojans, Worms & Spyware: There are many different types of computer viruses circulating in the cyber world, including regular Computer Viruses, Worms, Trojans, and Spyware. Each is different

More information

Review Study on Techniques for Network worm Signatures Automation

Review Study on Techniques for Network worm Signatures Automation Review Study on Techniques for Network worm Signatures Automation 1 Mohammed Anbar, 2 Sureswaran Ramadass, 3 Selvakumar Manickam, 4 Syazwina Binti Alias, 5 Alhamza Alalousi, and 6 Mohammed Elhalabi 1,

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Botnet Detection by Abnormal IRC Traffic Analysis

Botnet Detection by Abnormal IRC Traffic Analysis Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National

More information

IQware's Approach to Software and IT security Issues

IQware's Approach to Software and IT security Issues IQware's Approach to Software and IT security Issues The Need for Security Security is essential in business intelligence (BI) systems since they have access to critical and proprietary enterprise information.

More information

Self-Defending Approach of a Network

Self-Defending Approach of a Network Self-Defending Approach of a Network Anshuman Kumar 1, Abhilash Kamtam 2, Prof. U. C. Patkar 3 (Guide) 1Bharati Vidyapeeth's College of Engineering Lavale, Pune-412115, India 2Bharati Vidyapeeth's College

More information

ABB s approach concerning IS Security for Automation Systems

ABB s approach concerning IS Security for Automation Systems ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik [email protected] The problem Most manufacturing facilities are more connected (and

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Stability analysis of a novel VEISV propagation model of computer worm attacks

Stability analysis of a novel VEISV propagation model of computer worm attacks ISSN 1 746-7233, England, UK World Journal of Modelling and Simulation Vol. 10 (2014) No. 3, pp. 163-174 Stability analysis of a novel VEISV propagation model of computer worm attacks M. Javidi 1, N. Nyamorady

More information

An Artificial Immune Model for Network Intrusion Detection

An Artificial Immune Model for Network Intrusion Detection An Artificial Immune Model for Network Intrusion Detection Jungwon Kim and Peter Bentley Department of Computer Science, University Collge London Gower Street, London, WC1E 6BT, U. K. Phone: +44-171-380-7329,

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software Cryptography and Network Security Chapter 21 Fifth Edition by William Stallings Chapter 21 Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature:

More information

specific B cells Humoral immunity lymphocytes antibodies B cells bone marrow Cell-mediated immunity: T cells antibodies proteins

specific B cells Humoral immunity lymphocytes antibodies B cells bone marrow Cell-mediated immunity: T cells antibodies proteins Adaptive Immunity Chapter 17: Adaptive (specific) Immunity Bio 139 Dr. Amy Rogers Host defenses that are specific to a particular infectious agent Can be innate or genetic for humans as a group: most microbes

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to [email protected] 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and

More information

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations

More information

Common Cyber Threats. Common cyber threats include:

Common Cyber Threats. Common cyber threats include: Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...

More information

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors

Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Integration Misuse and Anomaly Detection Techniques on Distributed Sensors Shih-Yi Tu Chung-Huang Yang Kouichi Sakurai Graduate Institute of Information and Computer Education, National Kaohsiung Normal

More information

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System Detection of DDoS Attack Using Virtual Security N.Hanusuyakrish, D.Kapil, P.Manimekala, M.Prakash Abstract Distributed Denial-of-Service attack (DDoS attack) is a machine which makes the network resource

More information

Firewalls Overview and Best Practices. White Paper

Firewalls Overview and Best Practices. White Paper Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not

More information

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop

More information

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006 CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your

More information

CS549: Cryptography and Network Security

CS549: Cryptography and Network Security CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared

More information

International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012 www.ijcsn.org ISSN 2277-5420. Bhopal, M.P.

International Journal of Computer Science and Network (IJCSN) Volume 1, Issue 5, October 2012 www.ijcsn.org ISSN 2277-5420. Bhopal, M.P. Prevention of Buffer overflow Attack Blocker Using IDS 1 Pankaj B. Pawar, 2 Malti Nagle, 3 Pankaj K. Kawadkar Abstract 1 PIES Bhopal, RGPV University, 2 PIES Bhopal, RGPV University, 3 PIES Bhopal, RGPV

More information

Fighting Advanced Threats

Fighting Advanced Threats Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.

More information

The Microsoft JPEG Vulnerability and the Six New Content Security Requirements

The Microsoft JPEG Vulnerability and the Six New Content Security Requirements The Microsoft JPEG Vulnerability and the Six New Content Security Requirements Table of Contents OVERVIEW...3 1. THE VULNERABILITY DESCRIPTION...3 2. NEEDED: A NEW PARADIGM IN CONTENT SECURITY...4 3. PRACTICAL

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks

DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks DDoS Attack Detection Using Flow Entropy and Packet Sampling on Huge Networks Jae-Hyun Jun School of Computer Science and Engineering Kyungpook National University [email protected] Cheol-Woong Ahn

More information

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor

More information

WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli

WORMS : attacks, defense and models. Presented by: Abhishek Sharma Vijay Erramilli WORMS : attacks, defense and models Presented by: Abhishek Sharma Vijay Erramilli What is a computer worm? Is it not the same as a computer virus? A computer worm is a program that selfpropagates across

More information

Optimal worm-scanning method using vulnerable-host distributions

Optimal worm-scanning method using vulnerable-host distributions Optimal worm-scanning method using vulnerable-host distributions Zesheng Chen and Chuanyi Ji School of Electrical & Computer Engineering Georgia Institute of Technology, Atlanta, Georgia 3332 Email: {zchen,

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Cybersecurity for the C-Level

Cybersecurity for the C-Level Cybersecurity for the C-Level Director Glossary of Defined Cybersecurity Terms A Active Attack An actual assault perpetrated by an intentional threat source that attempts to alter a system, its resources,

More information

COSC 472 Network Security

COSC 472 Network Security COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: [email protected] Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html

More information

Managing Security Risks in Modern IT Networks

Managing Security Risks in Modern IT Networks Managing Security Risks in Modern IT Networks White Paper Table of Contents Executive summary... 3 Introduction: networks under siege... 3 How great is the problem?... 3 Spyware: a growing issue... 3 Feeling

More information

Supplemental Material CBE Life Sciences Education. Su et al.

Supplemental Material CBE Life Sciences Education. Su et al. Supplemental Material CBE Life Sciences Education Su et al. APPENDIX Human Body's Immune System Test This test consists of 31 questions, with only 1 answer to be selected for each question. Please select

More information

WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title:

WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title: HALMSTAD UNIVERSITY Network Design and Computer Management Course Title: Network Security Project Title: WORMS Project members: - Tchape Philippe 841122-T099 - Jose Enrique Charpentier 830112-9154 Lecturer:

More information

Security Consultant Scenario INFO 517-900 Term Project. Brad S. Brady. Drexel University

Security Consultant Scenario INFO 517-900 Term Project. Brad S. Brady. Drexel University Security Consultant Scenario INFO 517-900 Term Project Drexel University Author Note This paper was prepared for INFO-517-900 taught by Dr. Scott White. Table of Contents ABSTRACT.1 THE INTERVIEW...2 THE

More information

ANDRA ZAHARIA MARCOM MANAGER

ANDRA ZAHARIA MARCOM MANAGER 10 Warning Signs that Your Computer is Malware Infected [Updated] ANDRA ZAHARIA MARCOM MANAGER MAY 16TH, 2016 6:05 Malware affects us all The increasing number of Internet users worldwide creates an equal

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks

Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Towards Understanding the (In)security of Networked Systems under Topology-directed Stealthy Attacks Paul Parker Shouhuai Xu Department of Computer Science, University of Texas at San Antonio {pparker,shxu}@cs.utsa.edu

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Recommended Practice Case Study: Cross-Site Scripting. February 2007 Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber

More information

Building A Secure Microsoft Exchange Continuity Appliance

Building A Secure Microsoft Exchange Continuity Appliance Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building

More information

Ontario Pandemic Influenza Plan for Continuity of Electricity Operations

Ontario Pandemic Influenza Plan for Continuity of Electricity Operations Planning Guideline GDE-162 Ontario Pandemic Influenza Plan for Continuity of Electricity Operations Planning Guideline Issue 4.0 October 13, 2015 Emergency Preparedness Task Force This planning guide provides

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of

More information

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem Security & SMEs An Introduction by Jan Gessin Introduction to the problem SMEs convinced it will never happen to them. In many ways SMEs are more of a target than big business. Harsh realities of the online

More information

Sapphire/Slammer Worm. Code Red v2. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Why Was Slammer So Fast?

Sapphire/Slammer Worm. Code Red v2. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Sapphire/Slammer Worm. Why Was Slammer So Fast? First Worm Ever Morris Worm Robert Morris, a PhD student at Cornell, was interested in network security He created the first worm with a goal to have a program live on the Internet in November 9 Worm was

More information

Candy Antigens and Antibodies

Candy Antigens and Antibodies LAB ACTIVITY: Candy Antigens and Antibodies TEACHER S EDITION Curricular Links: Biology 20, Science 30 Class Time: 1 period Suggested Answers: Question 1: What is the main function of red blood cells?

More information

Hackers: Detection and Prevention

Hackers: Detection and Prevention Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings Computer Security Principles and Practice Second Edition William Stailings Lawrie Brown University ofnew South Wales, Australian Defence Force Academy With Contributions by Mick Bauer Security Editor,

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking

Hacking Book 1: Attack Phases. Chapter 1: Introduction to Ethical Hacking Hacking Book 1: Attack Phases Chapter 1: Introduction to Ethical Hacking Objectives Understand the importance of information security in today s world Understand the elements of security Identify the phases

More information

Advanced Honeypot Architecture for Network Threats Quantification

Advanced Honeypot Architecture for Network Threats Quantification Advanced Honeypot Architecture for Network Threats Quantification Mr. Susheel George Joseph M.C.A, M.Tech, M.Phil(CS) (Associate Professor, Department of M.C.A, Kristu Jyoti College of Management and Technology,

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org

Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological

More information

Immunity Unit Test Z

Immunity Unit Test Z Immunity Unit Test Z Name MB Multiple Choice Identify the choice that best completes the statement or answers the question. 1. Which of the pathogens in Figure 31.1 cause disease by taking over healthy

More information

The Four-Step Guide to Understanding Cyber Risk

The Four-Step Guide to Understanding Cyber Risk Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model

More information

How To Audit The Mint'S Information Technology

How To Audit The Mint'S Information Technology Audit Report OIG-05-040 INFORMATION TECHNOLOGY: Mint s Computer Security Incident Response Capability Needs Improvement July 13, 2005 Office of Inspector General Department of the Treasury Contents Audit

More information

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

How to Detect and Prevent Cyber Attacks

How to Detect and Prevent Cyber Attacks Distributed Intrusion Detection and Attack Containment for Organizational Cyber Security Stephen G. Batsell 1, Nageswara S. Rao 2, Mallikarjun Shankar 1 1 Computational Sciences and Engineering Division

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION

2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION 2006-1607: SENIOR DESIGN PROJECT: DDOS ATTACK, DETECTION AND DEFENSE SIMULATION Yu Cai, Michigan Technological University Dr. Yu Cai is an assistant professor at School of Technology in Michigan Technological

More information

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information

Virtual Desktops Security Test Report

Virtual Desktops Security Test Report Virtual Desktops Security Test Report A test commissioned by Kaspersky Lab and performed by AV-TEST GmbH Date of the report: May 19 th, 214 Executive Summary AV-TEST performed a comparative review (January

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May-2015 1681 Software as a Model for Security in Cloud over Virtual Environments S.Vengadesan, B.Muthulakshmi PG Student,

More information

Understanding Virus Behavior in 32-bit Operating Environments

Understanding Virus Behavior in 32-bit Operating Environments Understanding Virus Behavior in 32-bit Operating Environments Executive Summary Computer Viruses and How They Spread Types of Viruses How Viruses Spread Virus Damage Viruses in a Windows 95 Environment

More information

The Immune System. 2 Types of Defense Mechanisms. Lines of Defense. Line of Defense. Lines of Defense

The Immune System. 2 Types of Defense Mechanisms. Lines of Defense. Line of Defense. Lines of Defense The Immune System 2 Types of Defense Mechanisms Immune System the system that fights infection by producing cells to inactivate foreign substances to avoid infection and disease. Immunity the body s ability

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

The Immune System and Disease

The Immune System and Disease Chapter 40 The Immune System and Disease Section 40 1 Infectious Disease (pages 1029 1033) This section describes the causes of disease and explains how infectious diseases are transmitted Introduction

More information

Automatic Defense against Zero-day Polymorphic Worms in Communication Networks. Authors: Mohssen Mohammed and Al-Sakib Khan Pathan

Automatic Defense against Zero-day Polymorphic Worms in Communication Networks. Authors: Mohssen Mohammed and Al-Sakib Khan Pathan Automatic Defense against Zero-day Polymorphic Worms in Communication Networks Authors: Mohssen Mohammed and Al-Sakib Khan Pathan Dedicated to To my father Mohammed Zain Elabdeen Mohammed; my sister Maali

More information

Capabilities for Cybersecurity Resilience

Capabilities for Cybersecurity Resilience Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances

More information

Detecting Computer Worms in the Cloud

Detecting Computer Worms in the Cloud Detecting Computer Worms in the Cloud Sebastian Biedermann and Stefan Katzenbeisser Security Engineering Group Department of Computer Science Technische Universität Darmstadt {biedermann,katzenbeisser}@seceng.informatik.tu-darmstadt.de

More information

Defending Against Cyber Attacks with SessionLevel Network Security

Defending Against Cyber Attacks with SessionLevel Network Security Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive

More information