It is always assumed that if the attackers can achieve their goal by exploiting a vulnerability once, they won't exploit it twice. This assumption shapes our view of what attacks look like, and affects the design of many security systems. In this work, we propose the swarm attack, in which the attacker deliberately exploits the same vulnerability multiple times, each intended to carry out only a small part of the attack goal. We have studied eight systems that detect attacks using network-level emulation/analysis, and find them surprisingly vulnerable to attacks based on this strategy. © 2008 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Chung, S. P., & Mok, A. K. (2008). Swarm attacks against network-level emulation/analysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5230 LNCS, pp. 175–190). https://doi.org/10.1007/978-3-540-87403-4_10
Mendeley helps you to discover research relevant for your work.