Abstract
Perfect protection against all system threats is considered to be impossible. The problem of monitoring against the threats has been an issue in literature, but its progress has not yet been met any practical need. Further, the inherent complexity of the problem in terms of any known approaches gives firm impressions that there are no practical solutions, and so fewer challenges have been made than those against virus and worms. This paper presents a new challenge of setting up traps against most interception threats that try to copy or read illicitly programs or data. Figuratively, traps are set up on the place where any legitimate program could not reach. The proposed technique uses sensor objects and is considered to be the best way of detecting unknown interception threats.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Stallings W.: Operating Systems 4th Ed., Ch. 15, Prentice Hall, (2001)
Landwehr C.E., Bull A.R., Mcdermott J.P., and Choi W.S.: A Taxonomy of Computer Program Security Flaws, with Examples. ACM Computing Surveys, Vol. 26 no. 3, Sept. (1994)
Bishop M.: Vulnerabilities Analysis. Proceedings of the Second Recent Advances in Intrusion Detection, Sep. (1999) 25–136
What’s wrong with traditional anti-virus software?. (http://www.cnet.com/software/0-7760531-8-7383657-2.html)
Viega J., Block J.T., Konno T., McGraw G.: ITS4:A Static Vulnerability Scanner for C and C++ code. Reliable Software Technologies Technical Report
Lo R., Kerchen P., Crawford R., Ho W., Crossley J., Fink G., Levitt K., Olsson R., Archer M.: Towards a Testbed for Malicious code detection. COMPCON Spring’ 91. Digest of Papers. San Francisco, CA, Feb.–Mar. (1991) 160–166
Understanding Heuristics: Symantec’s Bloodhound Technology. Symantec White Paper Series Volume XXXIV
Tesauro G., Kephart J.O., Sorkin G.B.: Neural Networks for Computer Virus Recognition. IEEE Expert, Vol. 11, no. 4, Aug. (1996) 5–6
Charras C. and Lecroq T.: Handbook of Exact String-Matching Algorithms. (http://www-igm.univ-mlv.fr/~lecroq/biblio_en.html)
McHugh J.: Intrusion and intrusion detection. CERT Coordination Center, Software Engineering Institute, CMU, July 27, (2001)
Anonymous, Maximum Linux Security, SAMS (1999) 538–549
ISO/IEC WD 18043 (SC 27 N 3180): Guidelines for the implementation, operation and management of intrusion detection systems (IDS) (http://www.din.de/ ni/sc27/ doc7.html), 2002-04-26
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cho, S., Chang, C., Kim, J., Choi, J. (2003). A Study on Monitoring and Protecting Computer System against Interception Threat. In: Chung, CW., Kim, CK., Kim, W., Ling, TW., Song, KH. (eds) Web and Communication Technologies and Internet-Related Social Issues — HSI 2003. HSI 2003. Lecture Notes in Computer Science, vol 2713. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45036-X_10
Download citation
DOI: https://doi.org/10.1007/3-540-45036-X_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40456-9
Online ISBN: 978-3-540-45036-8
eBook Packages: Springer Book Archive