Record Detail Back

XML

Intrusion Detection Networks


In November 2008, a new type of computer worm started to spread quickly. It used three different types of attack on Windows⃝R hosts: exploiting vulnerabilities, guessing passwords, and infecting removable devices [20]. In three months it took over about 9 million Microsoft⃝R Windows systems around the world and formed a massive bot net [5]. The estimated economic loss brought by this worm was USD 9.1 billion [33]. The worm was named “Conficker,” and it was only one of the thousands of worms that appear every year.
Nowadays the vast majority of computers are connected to the Internet. A number of applications used by billions of users on a day-to-day basis including email, Web browsing, video/audio streaming, social networking, online gaming, e-commerce, and online chatting rely on the Internet. At the same time, network intrusions have become a severe threat to the privacy and safety of computer users. Each year, mil- lions of malicious cyber attacks are reported [64, 145]. Attacks are becoming more sophisticated and stealthy, driven by an “underground economy” [65]. By defini- tion, network intrusions are unwanted traffic or computer activities that may be mali- cious or destructive, including viruses, worms, trojan horses, port scanning, password guessing, code injection, and session hijacking. The consequences of a network in- trusion can be user identity theft (ID theft), unwanted advertisement and commercial emails (spam), the degradation or termination of the host service (denial of service), or using fraudulent sources to obtain sensitive information from users (phishing). Network intrusions are usually accomplished with the assistance of malicious code (a.k.a. malware). In recent years, network intrusions have become more sophisticated and organized. Attackers can control a large number of compromised hosts/devices to form bot nets [5], and then launch organized attacks, such as distributed denial of service.
1st Edtion
13: 978-1-4665-6413-
NONE
Intrusion Detection Networks
Management
English
Taylor & Francis Group, LLC
2014
USA
1-261
LOADING LIST...
LOADING LIST...