scispace - formally typeset
Open AccessProceedings Article

Computer viruses

Reads0
Chats0
TLDR
This paper presents an overview of the main categories of malicious programs known as Trojan horses, viruses, bacteria, worms, and logic bombs, with a focus on their general behavior and the properties seen in their implementations.
Abstract
This paper presents an overview of the main categories of malicious programs known as Trojan horses, viruses, bacteria, worms, and logic bombs. The focus is on their general behavior and the properties seen in their implementations rather than the ultimate effects or their intended destructive behavior. Possible preventive measures are also discussed. >

read more

Citations
More filters
Proceedings Article

Distributed Denial of Service: Taxonomies of Attacks, Tools and Countermeasures

TL;DR: DDoS attack models are described and taxonomies to characterize the scope of DDoS attacks, the characteristics of the software attack tools used, and the countermeasures available are proposed to assist in the development of more generalized solutions to countering DDoSattacks.

Taxonomies of Distributed Denial of Service Networks, Attacks, Tools, and Countermeasures

TL;DR: This work is intended to assist in developing solutions that will provide a more generalized approach to countering DDoS attacks so that as new derivative attacks are developed a generic countermeasure model can be used to prevent secondary victims and stop DDoS attacked systems.
Proceedings ArticleDOI

Intrusion detection system using Honey Token based Encrypted Pointers to mitigate cyber threats for critical infrastructure networks

TL;DR: The Intrusion Detection System (IDS) is designed in such a way that it not only detects the intrusions but also recovers the entire zero day attack using reverse engineering approach.
Proceedings ArticleDOI

Minimizing the TCB for securing SCADA systems

TL;DR: This work outlines a strategy for securing SCADA systems that is immune to the presence of HMFs in SCADA system components and leverages low complexity hardware modules with complexity low enough to leave no room for hiding malicious functionality to realize the security goals.

Information security management in web-based product design and realization

TL;DR: A managerial approach for alleviating the problem of information security or reducing it to the barest minimum is proposed in this thesis through the design and development of an Information Security Management Model (ISM Model) to monitor, enforce and manage information security.
References
More filters
Journal ArticleDOI

Computer viruses

TL;DR: This paper introduces ''computer viruses'' and examines their potential for causing widespread damage to computer systems and the infeasibility of viral defense in large classes of systems.
Journal ArticleDOI

Reflections on trusting trust

TL;DR: To what extent should one trust a statement that a program is free of Trojan horses?
Book

Reflections on trusting trust

Ken Thompson
TL;DR: To what extent should one trust a statement that a program is free of Trojan horses? as discussed by the authors suggests that it is more important to trust the people who wrote the software, rather than the statement itself.