ResMon: Securing Resource Consumption of Critical Infrastructure from Wanton Applications
In: International Journal of Computer Applications, Jg. 137 (2016-03-17), S. 15-22
Online
unknown
Zugriff:
Hackers have devised a recent technique of infiltrating critical infrastructure with wanton applications that gulp at the limited resources possessed by these infrastructure for meeting critical needs and deadlines. Also a reality is the fact that hackers could breach already existing and trusted applications or software on these critical infrastructure and bug them with malicious codes that plunge them into a state of wantonness; consuming limited, critical resources and making none (or insufficient) available for other, equally critical applications that depend on a fair portion of the same resources to meet their deadlines and critical requirements. This development portends the next generation of denial of service (DoS) and distributed denial of service (DDoS) attacks to critical infrastructure, where all that is required is to discover vulnerabilities in already trusted and running applications on critical infrastructure or deliver and escalate new applications on these critical infrastructure and plunge them into wantonness, consuming limited resources and resulting in a denial of service. Proposals already exist in literature that could forestall an occurrence of such attacks, but some of these have not previously been tested; one of such being that documented by [1]. This research is an experimental implementation of the theoretical model proposed in the cited article, in order to test and validate its workability and results. An experimental prototype – codenamed “ResMon” – of the model proposed is built and validated within the Ubuntu Linux operating system environment. General Terms Network Security, Denial of Service, Critical Infrastructure.
Titel: |
ResMon: Securing Resource Consumption of Critical Infrastructure from Wanton Applications
|
---|---|
Autor/in / Beteiligte Person: | Ainam, Jean-Paul ; S A Idowu ; Ogu, Emmanuel C. ; Chiemela, Ogu |
Link: | |
Zeitschrift: | International Journal of Computer Applications, Jg. 137 (2016-03-17), S. 15-22 |
Veröffentlichung: | Foundation of Computer Science, 2016 |
Medientyp: | unknown |
ISSN: | 0975-8887 (print) |
DOI: | 10.5120/ijca2016908814 |
Schlagwort: |
|
Sonstiges: |
|