首页> 外文会议>International Conference on Electronic Computer Technology >Discovering vulnerability to build a secured system using attack injection
【24h】

Discovering vulnerability to build a secured system using attack injection

机译:发现脆弱性使用攻击注入构建安全系统

获取原文

摘要

The computer system may face several problem because of threats and forms of attack. This project presents a methodology for the automatic discovery of zombie based vulnerabilities in software components. Zombie based attack is injected to the system through the network, these attack takes the availabilityof server and the responses returned to the clients. The observation of an unexpected behavior suggests the presence of vulnerability that was triggered by some particular attack (or group of attack). Once the vulnerability is detected, the process of building a secured system is done by overcoming the vulnerability. The methodology was implemented in XDoS and TCP/IP. It was designed to look for vulnerabilities in network server applications, although it can also be utilized with local daemons.
机译:由于威胁和攻击形式,计算机系统可能面临几个问题。 该项目提供了一种自动发现软件组件中基于僵尸的漏洞的方法。 基于Zombie的攻击通过网络注入系统,这些攻击需要服务器的可用性,并返回给客户端的响应。 对意外行为的观察表明存在由某种特定攻击(或攻击组)触发的漏洞的存在。 一旦检测到漏洞,通过克服漏洞来完成构建安全系统的过程。 该方法在XDOS和TCP / IP中实现。 它旨在寻找网络服务器应用程序中的漏洞,尽管它也可以与本地守护进程一起使用。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号