Swarm attacks against network-level emulation/analysis

3Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It is always assumed that if the attackers can achieve their goal by exploiting a vulnerability once, they won't exploit it twice. This assumption shapes our view of what attacks look like, and affects the design of many security systems. In this work, we propose the swarm attack, in which the attacker deliberately exploits the same vulnerability multiple times, each intended to carry out only a small part of the attack goal. We have studied eight systems that detect attacks using network-level emulation/analysis, and find them surprisingly vulnerable to attacks based on this strategy. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Chung, S. P., & Mok, A. K. (2008). Swarm attacks against network-level emulation/analysis. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5230 LNCS, pp. 175–190). https://doi.org/10.1007/978-3-540-87403-4_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free