Open AccessProceedings Article
Computer viruses
C.E. Pelaez,J.B. Bowles +1 more
Reads0
Chats0
TLDR
This paper presents an overview of the main categories of malicious programs known as Trojan horses, viruses, bacteria, worms, and logic bombs, with a focus on their general behavior and the properties seen in their implementations.Abstract:
This paper presents an overview of the main categories of malicious programs known as Trojan horses, viruses, bacteria, worms, and logic bombs. The focus is on their general behavior and the properties seen in their implementations rather than the ultimate effects or their intended destructive behavior. Possible preventive measures are also discussed. >read more
Citations
More filters
Proceedings Article
Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures
Stephen M. Specht,Ruby B. Lee +1 more
TL;DR: DDoS attack models are described and taxonomies to characterize the scope of DDoS attacks, the characteristics of the software attack tools used, and the countermeasures available are proposed to assist in the development of more generalized solutions to countering DDoSattacks.
Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures
Stephen M. Specht,Ruby B. Lee +1 more
TL;DR: This work is intended to assist in developing solutions that will provide a more generalized approach to countering DDoS attacks so that as new derivative attacks are developed a generic countermeasure model can be used to prevent secondary victims and stop DDoS attacked systems.
Proceedings ArticleDOI
Intrusion detection system using Honey Token based Encrypted Pointers to mitigate cyber threats for critical infrastructure networks
TL;DR: The Intrusion Detection System (IDS) is designed in such a way that it not only detects the intrusions but also recovers the entire zero day attack using reverse engineering approach.
Proceedings ArticleDOI
Minimizing the TCB for securing SCADA systems
TL;DR: This work outlines a strategy for securing SCADA systems that is immune to the presence of HMFs in SCADA system components and leverages low complexity hardware modules with complexity low enough to leave no room for hiding malicious functionality to realize the security goals.
Information security management in web-based product design and realization
TL;DR: A managerial approach for alleviating the problem of information security or reducing it to the barest minimum is proposed in this thesis through the design and development of an Information Security Management Model (ISM Model) to monitor, enforce and manage information security.
References
More filters
Journal ArticleDOI
Computer viruses
TL;DR: This paper introduces ''computer viruses'' and examines their potential for causing widespread damage to computer systems and the infeasibility of viral defense in large classes of systems.
Journal ArticleDOI
Reflections on trusting trust
TL;DR: To what extent should one trust a statement that a program is free of Trojan horses?
Book
Reflections on trusting trust
TL;DR: To what extent should one trust a statement that a program is free of Trojan horses? as discussed by the authors suggests that it is more important to trust the people who wrote the software, rather than the statement itself.