DocumentCode :
588629
Title :
Are Computer Focused Crimes Impacted by System Configurations? An Empirical Study
Author :
Sobesto, Bertrand ; Cukier, Michel ; Maimon, D.
Author_Institution :
Clark Sch. of Eng., Univ. of Maryland, College Park, MD, USA
fYear :
2012
fDate :
27-30 Nov. 2012
Firstpage :
191
Lastpage :
200
Abstract :
This paper describes an empirical study to assess whether computer focused crimes are impacted by system configurations. The study relies on data collected during 30 days on a farm of target computers of various configurations (disk space, memory size, and bandwidth). In addition, some target computers included a warning sign. Following a brute force attack on SSH, attackers randomly access one of these computer configurations and are allowed to use it for 30 days. We monitor network traffic and attackers´ keystrokes to analyze the attack. This paper focuses specifically on the crime, i.e., the use of the computer to launch an attack towards an external target. We define various computer focused crime characteristics (i.e., whether the attack was destructive or not, whether the target was an opportunity or a choice, whether the attack was coordinated or not) and analyze whether the committed crime is significantly impacted by the system configuration.
Keywords :
computer crime; bandwidth; brute force attack; computer focused crimes; data collection; disk space; external target; memory size; network traffic monitoring; system configurations; Bandwidth; Computers; Containers; Force; IP networks; Logic gates; Computer Focused Crime; Empirical Study; Honeypots;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Software Reliability Engineering (ISSRE), 2012 IEEE 23rd International Symposium on
Conference_Location :
Dallas, TX
ISSN :
1071-9458
Print_ISBN :
978-1-4673-4638-2
Type :
conf
DOI :
10.1109/ISSRE.2012.36
Filename :
6405367
Link To Document :
بازگشت