Unusable Security for Attackers

被引:0
作者
Zurko, Mary Ellen
机构
关键词
D O I
10.1109/MSEC.2023.3308648
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the things that makes security research different from other research is the presence of attackers, potentially or in actuality. The early research I was exposed to barely touched on the attacker. The Trusted Computer System Evaluation Criteria from the 1980s had hardly a whisper of functionality specifically for countering attacks, beyond auditing security relevant events. When we were researching and composing secure systems, most of us thought that antivirus, when it emerged, was a fool's game. Who could possibly catch all the different ways an attacker might go about breaching a system? The first question put to a presentation on intrusion detection system (IDS) research was predictably "How did you know that the system was free of attacks when you baselined it?"
引用
收藏
页码:4 / 7
页数:4
相关论文
共 50 条
[21]   SST AND CONCORDE - UNUSABLE [J].
不详 .
TECHNOLOGY REVIEW, 1971, 73 (03) :72-&
[22]   UNUSUAL USE FOR UNUSABLE FISH [J].
不详 .
FOOD ENGINEERING, 1985, 57 (01) :78-79
[23]   THE ATTACKERS ADVANTAGE [J].
MACKNESS, RF .
FORTUNE, 1988, 117 (12) :46-46
[24]   Attackers are not Stealthy: Statistical Analysis of the Well-Known and Infamous KDD Network Security Dataset [J].
Valle Silva, Joao Vitor ;
Lopez, Martin Andreoni ;
Mattos, Diogo M. F. .
2020 4TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2020, :1-8
[25]   Non-collaborative Attackers and How and Where to Defend Vulnerable Security Protocols (Transcript of Discussion) [J].
Vigano, Luca .
SECURITY PROTOCOLS XXII, 2014, 8809 :91-99
[26]   Lamboozling attackers [J].
Shortridge, Kelly ;
Petrich, Ryan .
Communications of the ACM, 2022, 65 (06) :44-53
[27]   Avian attackers [J].
不详 .
PHYSICIAN AND SPORTSMEDICINE, 1998, 26 (11) :18-18
[28]   PLAQUE ATTACKERS [J].
TRACY, EJ .
FORTUNE, 1985, 111 (10) :73-74
[29]   Non-collaborative Attackers and How and Where to Defend Flawed Security Protocols (Extended Version) [J].
Peroli, Michele ;
Vigano, Luca ;
Zavatteri, Matteo .
SECURITY PROTOCOLS XXII, 2014, 8809 :69-90
[30]   An Efficient Security Framework for Detection and Isolation of Attackers in Low Rate Wireless Personal Area Networks [J].
Priya, S. Padma ;
Pradhan, Jayaram .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (07) :224-232