首页 > 最新文献

2010 Fifth International Conference on Internet Monitoring and Protection最新文献

英文 中文
Is Apple's iMac Leopard Operating System Secure under ARP-Based Flooding Attacks? 苹果的iMac Leopard操作系统在基于arp的洪水攻击下安全吗?
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.30
Sirisha Surisetty, Sanjeev Kumar
Apple’s iMac computers are promoted by the Apple Inc. to be secure, safe, virus free and fast computers. In this experimental paper, we evaluate the security offered by the iMac computers with its usual Leopard Operating System, against ARP-based flooding attacks in a Gigabit LAN environment. We compared the effect of ARP attacks on Leopard OS against those on the Windows XP-SP2 when installed on the same iMac platform under the same network attack environment. ARP-based flooding attacks can originate in a LAN environment, which can impact a victim computer with a barrage of ARP requests, and there by exhausting resource of the victim computers in processing these requests. To study the impact on iMac computers, we created the ARP traffic in a controlled lab environment to test against iMac computer that first deployed Leopard OS and then later the same iMac platform was made to rather use Windows XP OS. It was found that the Apple’s iMac computer using its usual Leopard operating system crashed even under low bandwidth of ARP-based attack traffic, requiring forced reboot of the iMac computer. Interestingly, when compared with Microsoft’s Windows XP-SP2 operating system, deployed on the same iMac platform, the computer was able to sustain the attack and didn’t crash. Our discovery of this vulnerability shows that Apple’s popular operating systems namely Leopards commonly deployed on iMacs are prone to crash under ARP-based security attacks.
苹果的iMac电脑被苹果公司宣传为安全、安全、无病毒和快速的电脑。在这篇实验论文中,我们评估了iMac计算机在千兆局域网环境中使用其常用的Leopard操作系统抵御基于arp的洪水攻击所提供的安全性。我们比较了在相同的iMac平台上,在相同的网络攻击环境下,对Leopard OS和Windows XP-SP2进行ARP攻击的效果。基于ARP的泛洪攻击可以在局域网环境中发起,它可以通过大量的ARP请求来影响受害计算机,并且在处理这些请求时耗尽受害计算机的资源。为了研究对iMac电脑的影响,我们在一个受控的实验室环境中创建了ARP流量,对iMac电脑进行测试,iMac电脑首先部署了Leopard操作系统,后来同一iMac平台改为使用Windows XP操作系统。调查发现,使用苹果常用Leopard操作系统的iMac电脑即使在低带宽的基于arp的攻击流量下也会崩溃,需要强制重启iMac电脑。有趣的是,与部署在同一iMac平台上的微软Windows XP-SP2操作系统相比,这台电脑能够承受攻击,没有崩溃。我们发现的这个漏洞表明,苹果的流行操作系统,即通常部署在imac上的leopard,很容易在基于arp的安全攻击下崩溃。
{"title":"Is Apple's iMac Leopard Operating System Secure under ARP-Based Flooding Attacks?","authors":"Sirisha Surisetty, Sanjeev Kumar","doi":"10.1109/ICIMP.2010.30","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.30","url":null,"abstract":"Apple’s iMac computers are promoted by the Apple Inc. to be secure, safe, virus free and fast computers. In this experimental paper, we evaluate the security offered by the iMac computers with its usual Leopard Operating System, against ARP-based flooding attacks in a Gigabit LAN environment. We compared the effect of ARP attacks on Leopard OS against those on the Windows XP-SP2 when installed on the same iMac platform under the same network attack environment. ARP-based flooding attacks can originate in a LAN environment, which can impact a victim computer with a barrage of ARP requests, and there by exhausting resource of the victim computers in processing these requests. To study the impact on iMac computers, we created the ARP traffic in a controlled lab environment to test against iMac computer that first deployed Leopard OS and then later the same iMac platform was made to rather use Windows XP OS. It was found that the Apple’s iMac computer using its usual Leopard operating system crashed even under low bandwidth of ARP-based attack traffic, requiring forced reboot of the iMac computer. Interestingly, when compared with Microsoft’s Windows XP-SP2 operating system, deployed on the same iMac platform, the computer was able to sustain the attack and didn’t crash. Our discovery of this vulnerability shows that Apple’s popular operating systems namely Leopards commonly deployed on iMacs are prone to crash under ARP-based security attacks.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126318267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Constructing Communication Profiles by Clustering Selected Network Traffic Attributes 选取网络流量属性聚类构建通信配置文件
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.21
Olli Knuuti, Timo Seppälä, Teemu Alapaholuoma, J. Ylinen, P. Loula, P. Kumpulainen, Kimmo Hätönen
Large-scale IP networks cause special challenges to the security. The network consists of a large number of devices with a vast variety of traffic behavior. Implementation of the intrusion detection and monitoring mechanisms are often ineffective or require a lot of hardware and human resources. In this paper we present a methodology to construct communication profiles by making a time series and clusters from selected network attributes. Using the method we can divide the network devices into different groups by their traffic behavior even if we don’t know the role of each device or the network topology. Most appropriate intrusion detection or monitoring mechanisms can be assigned to each device according to its profile. It is also possible to monitor the changes in the devices’ behavior by inspecting their changes from constructed profile cluster to another. The changes between different profiles can be considered abnormal or common variation in the usage.
大规模的IP网络对安全性提出了特殊的挑战。网络由大量具有各种流量行为的设备组成。入侵检测和监控机制的实现往往是无效的,或者需要大量的硬件和人力资源。在本文中,我们提出了一种通过从选定的网络属性中制作时间序列和集群来构建通信配置文件的方法。该方法可以在不知道网络设备的作用和网络拓扑的情况下,根据设备的流量行为将网络设备划分为不同的组。可以根据每个设备的配置文件为其分配最适当的入侵检测或监视机制。还可以通过检查设备从构造的概要文件集群到另一个概要文件集群的变化来监视设备行为的变化。不同配置文件之间的变化可以被认为是使用中的异常或常见变化。
{"title":"Constructing Communication Profiles by Clustering Selected Network Traffic Attributes","authors":"Olli Knuuti, Timo Seppälä, Teemu Alapaholuoma, J. Ylinen, P. Loula, P. Kumpulainen, Kimmo Hätönen","doi":"10.1109/ICIMP.2010.21","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.21","url":null,"abstract":"Large-scale IP networks cause special challenges to the security. The network consists of a large number of devices with a vast variety of traffic behavior. Implementation of the intrusion detection and monitoring mechanisms are often ineffective or require a lot of hardware and human resources. In this paper we present a methodology to construct communication profiles by making a time series and clusters from selected network attributes. Using the method we can divide the network devices into different groups by their traffic behavior even if we don’t know the role of each device or the network topology. Most appropriate intrusion detection or monitoring mechanisms can be assigned to each device according to its profile. It is also possible to monitor the changes in the devices’ behavior by inspecting their changes from constructed profile cluster to another. The changes between different profiles can be considered abnormal or common variation in the usage.","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124436776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Coalitional Game Theory for Security Risk Management 安全风险管理的联盟博弈论
Pub Date : 2010-05-09 DOI: 10.1109/ICIMP.2010.14
W. Saad, T. Alpcan, T. Başar, A. Hjørungnes
Quantitative models for security risk management in organizations are recently receiving an increased attention in the research community. This paper investigates the possibility of cooperation among autonomous divisions of an organization with dependent security assets and/or vulnerabilities for reducing overall security risks. A coalitional game is formulated for modeling cooperation possibilities among these divisions based on their both positive (synergies) and negative (vulnerabilities) interdependencies. The proposed game constitutes a framework that allows to investigate how an organization can maximize its total utility through cooperation among its different divisions. The introduced utility accounts for the gains from cooperation, in terms of an improved synergy among the divisions, and the costs for cooperation that account for the friction among the divisions (e.g. due to social and human factors) as well as the difficulty of managing large-sized divisions. Using the proposed game model, the illustrative cases of two-coalition cooperation, two-division cooperation as well as a practical scenario when using an ideal cooperation protocol are analyzed
组织安全风险管理的定量模型最近在研究界受到越来越多的关注。本文研究了具有依赖安全资产和/或漏洞的组织的自治部门之间为减少整体安全风险而进行合作的可能性。基于这些部门之间的积极(协同)和消极(脆弱性)相互依赖关系,制定了一个联盟博弈来模拟它们之间的合作可能性。所提出的博弈构成了一个框架,允许研究组织如何通过不同部门之间的合作最大化其总效用。引入的效用考虑了合作的收益,即部门之间的协同作用得到改善,以及部门之间的摩擦(例如由于社会和人为因素)以及管理大型部门的困难所造成的合作成本。利用所提出的博弈模型,分析了两联盟合作、两部门合作的说明案例以及使用理想合作协议时的实际场景
{"title":"Coalitional Game Theory for Security Risk Management","authors":"W. Saad, T. Alpcan, T. Başar, A. Hjørungnes","doi":"10.1109/ICIMP.2010.14","DOIUrl":"https://doi.org/10.1109/ICIMP.2010.14","url":null,"abstract":"Quantitative models for security risk management in organizations are recently receiving an increased attention in the research community. This paper investigates the possibility of cooperation among autonomous divisions of an organization with dependent security assets and/or vulnerabilities for reducing overall security risks. A coalitional game is formulated for modeling cooperation possibilities among these divisions based on their both positive (synergies) and negative (vulnerabilities) interdependencies. The proposed game constitutes a framework that allows to investigate how an organization can maximize its total utility through cooperation among its different divisions. The introduced utility accounts for the gains from cooperation, in terms of an improved synergy among the divisions, and the costs for cooperation that account for the friction among the divisions (e.g. due to social and human factors) as well as the difficulty of managing large-sized divisions. Using the proposed game model, the illustrative cases of two-coalition cooperation, two-division cooperation as well as a practical scenario when using an ideal cooperation protocol are analyzed","PeriodicalId":314947,"journal":{"name":"2010 Fifth International Conference on Internet Monitoring and Protection","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117248282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
期刊
2010 Fifth International Conference on Internet Monitoring and Protection
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1