DocumentCode
3334644
Title
Doc, Wyatt, and Virgil: prototyping storage jamming defenses
Author
McDermott, J. ; Gelinas, R. ; Ornstein, S.
Author_Institution
Center for High-Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA
fYear
1997
fDate
8-12 Dec 1997
Firstpage
265
Lastpage
273
Abstract
Describes progress to date on three prototype tools for detecting storage jamming (or information warfare) attacks. One prototype (Doc) uses a replay defense; another (Wyatt) uses logical replication, and the third (Virgil) can be used to determine the source and pattern of a detected attack. Three prototype jammers are used to test the effectiveness of the defenses. Initial experiments have shown that access control, encryption, auditing and virus detection do not prevent or detect storage jamming. The prototype tools have been effective in detecting the same attacks. Object-oriented data storage may require the use of application-specific techniques for applying checksums
Keywords
auditing; authorisation; computer viruses; cryptography; data integrity; information storage; jamming; object-oriented databases; software prototyping; utility programs; Doc; Virgil; Wyatt; access control; application-specific techniques; attack pattern determination; attack source determination; auditing; checksums; encryption; information warfare; logical replication; object-oriented data storage; prototype tools; replay defense; storage jamming attack detection; storage jamming defense; virus detection; Access control; Cryptography; Hardware; Invasive software; Jamming; Laboratories; Operating systems; Prototypes; Testing; US Department of Transportation;
fLanguage
English
Publisher
ieee
Conference_Titel
Computer Security Applications Conference, 1997. Proceedings., 13th Annual
Conference_Location
San Diego, CA
ISSN
1063-9527
Print_ISBN
0-8186-8274-4
Type
conf
DOI
10.1109/CSAC.1997.646199
Filename
646199
Link To Document