DocumentCode :
391831
Title :
Invisible Trojan: an architecture, implementation and detection method
Author :
Beyah, Raheem A. ; Holloway, Michael C. ; Copeland, John A.
Author_Institution :
Commun. Syst. Center, Georgia Inst. of Technol., Atlanta, GA, USA
Volume :
3
fYear :
2002
fDate :
4-7 Aug. 2002
Abstract :
In this paper, we give an overview of different system-security tools, including several types of intrusion detection systems (IDSs) and host based detection tools. We also discuss, in detail, port scanning and the primary algorithm used in current port-scanning devices. In addition, we discuss the limitations in the current algorithms used in port-scanning devices and exploit these limitations by implementing an invisible Trojan that can elude today´s port scanners. Finally, we discuss defenses against this type of Trojan. This includes: a proposed method that port-scanning devices can implement, as well as general system-security recommendations.
Keywords :
access control; computer crime; computer viruses; data privacy; telecommunication security; IDS; Trojan defenses; Trojan detection method; Trojan implementation; host based detection tools; intrusion detection systems; invisible Trojan architecture; port scanning; system security tools; Computer architecture; Computer networks; Data security; Databases; Educational institutions; Information security; Intrusion detection; Investments; Open source software; Pattern matching;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Circuits and Systems, 2002. MWSCAS-2002. The 2002 45th Midwest Symposium on
Print_ISBN :
0-7803-7523-8
Type :
conf
DOI :
10.1109/MWSCAS.2002.1187083
Filename :
1187083
Link To Document :
بازگشت