Logic Bomb: An Insider Attack

  • Dusane P
N/ACitations
Citations of this article
35Readers
Mendeley users who have this article in their library.

Abstract

Cyberattacks are one of the biggest threats to the Computer World. Security researchers and professionals are continuously making various efforts to prevent such attacks. Most of the times these attacks come from outside, but sometimes it can be an insider attack too. Insider attack can be more lethal, as the malicious person will have authorized system access. Logic Bomb is one of such examples of an insider attack. A successfully triggered logic bomb can cause system failure, auto-deletion of hard drives, manipulation of data, etc. Logic Bombs are generally hidden or embedded in genuine code where they stay dormant until their conditions are not satisfied, this makes them very hard to detect. This malware is normally programmed by a developer of the software. The attackers usually exploit software development lifecycle to insert a logic bomb. Such type of hidden malicious code in the system software can be a serious threat to their IT infrastructure. As the world is now moving toward smart and digital cities, all the IoT and Automated systems should be protected from such attack. This paper involves the study of an insider logic bomb attack, its preventive measures, proposed code-level detection system and detailed steps for recovery.

Cite

CITATION STYLE

APA

Dusane, P. S. (2020). Logic Bomb: An Insider Attack. International Journal of Advanced Trends in Computer Science and Engineering, 9(3), 3662–3665. https://doi.org/10.30534/ijatcse/2020/176932020

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free