Capturing a security breach

作者: Elias Levy

DOI:

关键词:

摘要: Today’s computer systems are subject to breaches by mali cious code, such as computer viruses and worms. Early detec tion and capture of such breaches would be beneficial as this data can be analyzed and used to protect a computer system from future attacks. There are several ways that can be used to capture a security breach. A user can Submit malicious code samples after the user's computer has been attacked. A prob lem with this method is that the user's system is already breached with possibly severe consequences. Another way to obtain information about a potential attack is to obtain sample code from sharing groups. However, this kind of information can be unreliable. Yet another way of obtaining information is via a honey pot. Honey pots are computer programs or systems that are meant to be breached for the purpose of capturing informa tion associated with the breach. Such information can then …

参考文章(0)