Title :
Doc, Wyatt, and Virgil: prototyping storage jamming defenses
Author :
McDermott, J. ; Gelinas, R. ; Ornstein, S.
Author_Institution :
Center for High-Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
Abstract :
Describes progress to date on three prototype tools for detecting storage jamming (or information warfare) attacks. One prototype (Doc) uses a replay defense; another (Wyatt) uses logical replication, and the third (Virgil) can be used to determine the source and pattern of a detected attack. Three prototype jammers are used to test the effectiveness of the defenses. Initial experiments have shown that access control, encryption, auditing and virus detection do not prevent or detect storage jamming. The prototype tools have been effective in detecting the same attacks. Object-oriented data storage may require the use of application-specific techniques for applying checksums
Keywords :
auditing; authorisation; computer viruses; cryptography; data integrity; information storage; jamming; object-oriented databases; software prototyping; utility programs; Doc; Virgil; Wyatt; access control; application-specific techniques; attack pattern determination; attack source determination; auditing; checksums; encryption; information warfare; logical replication; object-oriented data storage; prototype tools; replay defense; storage jamming attack detection; storage jamming defense; virus detection; Access control; Cryptography; Hardware; Invasive software; Jamming; Laboratories; Operating systems; Prototypes; Testing; US Department of Transportation;
Conference_Titel :
Computer Security Applications Conference, 1997. Proceedings., 13th Annual
Conference_Location :
San Diego, CA
Print_ISBN :
0-8186-8274-4
DOI :
10.1109/CSAC.1997.646199