DocumentCode
391831
Title
Invisible Trojan: an architecture, implementation and detection method
Author
Beyah, Raheem A. ; Holloway, Michael C. ; Copeland, John A.
Author_Institution
Commun. Syst. Center, Georgia Inst. of Technol., Atlanta, GA, USA
Volume
3
fYear
2002
fDate
4-7 Aug. 2002
Abstract
In this paper, we give an overview of different system-security tools, including several types of intrusion detection systems (IDSs) and host based detection tools. We also discuss, in detail, port scanning and the primary algorithm used in current port-scanning devices. In addition, we discuss the limitations in the current algorithms used in port-scanning devices and exploit these limitations by implementing an invisible Trojan that can elude today´s port scanners. Finally, we discuss defenses against this type of Trojan. This includes: a proposed method that port-scanning devices can implement, as well as general system-security recommendations.
Keywords
access control; computer crime; computer viruses; data privacy; telecommunication security; IDS; Trojan defenses; Trojan detection method; Trojan implementation; host based detection tools; intrusion detection systems; invisible Trojan architecture; port scanning; system security tools; Computer architecture; Computer networks; Data security; Databases; Educational institutions; Information security; Intrusion detection; Investments; Open source software; Pattern matching;
fLanguage
English
Publisher
ieee
Conference_Titel
Circuits and Systems, 2002. MWSCAS-2002. The 2002 45th Midwest Symposium on
Print_ISBN
0-7803-7523-8
Type
conf
DOI
10.1109/MWSCAS.2002.1187083
Filename
1187083
Link To Document