首页> 外文期刊>Journal of High Speed Networks >A self-checking signature scheme for checking backdoor security attacks in Internet
【24h】

A self-checking signature scheme for checking backdoor security attacks in Internet

机译:一种自我检查签名方案,用于检查Internet中的后门安全攻击

获取原文
获取原文并翻译 | 示例
           

摘要

It is very common for people across the globe to collaborate on the Internet and intellectual property amongst each other, A serious threat to this form of collaboration can come from "backdoor" attacks from hackers, who can distort the information content. For example, a backdoor attack may replace common operating system functions with malicious ones. A possible precaution against such an attack is to generate a signature database and compare the signature of a system functionality with its golden signature before using the functionality. We present an alternate and novel method to detect Trojan activity. Called time fingerprinting, the method relies on observing a finite number of fingerprints during signature generation and tracing the Trojan fingerprints in system files. We have verified the desired properties using common semi trusted operating system files.
机译:对于全世界的人们来说,在Internet和知识产权之间进行协作是非常普遍的。这种协作形式的严重威胁可能来自黑客的“后门”攻击,黑客可以使信息内容失真。例如,后门攻击可能会将常见的操作系统功能替换为恶意功能。应对此类攻击的一种可能的预防措施是在使用功能之前,先生成签名数据库,并将系统功能的签名与其黄金签名进行比较。我们提出了一种替代的新颖方法来检测木马活动。该方法称为时间指纹,它依赖于在签名生成过程中观察有限数量的指纹并跟踪系统文件中的Trojan指纹。我们已经使用常见的半信任操作系统文件验证了所需的属性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号