DocumentCode :
3334644
Title :
Doc, Wyatt, and Virgil: prototyping storage jamming defenses
Author :
McDermott, J. ; Gelinas, R. ; Ornstein, S.
Author_Institution :
Center for High-Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
fYear :
1997
fDate :
8-12 Dec 1997
Firstpage :
265
Lastpage :
273
Abstract :
Describes progress to date on three prototype tools for detecting storage jamming (or information warfare) attacks. One prototype (Doc) uses a replay defense; another (Wyatt) uses logical replication, and the third (Virgil) can be used to determine the source and pattern of a detected attack. Three prototype jammers are used to test the effectiveness of the defenses. Initial experiments have shown that access control, encryption, auditing and virus detection do not prevent or detect storage jamming. The prototype tools have been effective in detecting the same attacks. Object-oriented data storage may require the use of application-specific techniques for applying checksums
Keywords :
auditing; authorisation; computer viruses; cryptography; data integrity; information storage; jamming; object-oriented databases; software prototyping; utility programs; Doc; Virgil; Wyatt; access control; application-specific techniques; attack pattern determination; attack source determination; auditing; checksums; encryption; information warfare; logical replication; object-oriented data storage; prototype tools; replay defense; storage jamming attack detection; storage jamming defense; virus detection; Access control; Cryptography; Hardware; Invasive software; Jamming; Laboratories; Operating systems; Prototypes; Testing; US Department of Transportation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1997. Proceedings., 13th Annual
Conference_Location :
San Diego, CA
ISSN :
1063-9527
Print_ISBN :
0-8186-8274-4
Type :
conf
DOI :
10.1109/CSAC.1997.646199
Filename :
646199
Link To Document :
بازگشت