The state of security on the internet
netWorker - Patent frenzy!
CITC5 '04 Proceedings of the 5th conference on Information technology education
Toward understanding distributed blackhole placement
Proceedings of the 2004 ACM workshop on Rapid malcode
Design of network security projects using honeypots
Journal of Computing Sciences in Colleges
Queue - Security
Characteristics and responsibilities involved in a Phishing attack
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
Communications of the ACM - Spyware
Seeing further: extending visualization as a basis for usable security
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
Analysis of traceback techniques
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers
Proceedings of the 3rd international workshop on Visualization for computer security
Puppetnets: misusing web browsers as a distributed attack infrastructure
Proceedings of the 13th ACM conference on Computer and communications security
Proceedings of the 1st workshop on Architectural and system support for improving software dependability
Protecting mobile devices from TCP flooding attacks
Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture
Enhancing research into usable privacy and security
Proceedings of the 27th ACM international conference on Design of communication
An 802.11 MAC layer covert channel
Wireless Communications & Mobile Computing
Hi-index | 0.00 |
The focus of this paper is to identify dominant trends of information security threats to the Internet 2001 to 2007. This paper is intended to provide an understanding of the new emphasis of attacks through use of robotic networks and how some users and organizations are already preparing a response using innovative visualization techniques in conjunction with traditional methods. The scope of research will focus on basic enterprise level services that are commonly provided by various corporations; e.g., e-mail, browser applications, wireless and mobile devices, IP telephony, and online banking. The research will first review the network infrastructure common to most corporate organizations and assume basic enterprise components and functionality in response to the current security threats. The second emphasis will consider the impact of malware robotic networks (Botnets and Puppetnets) on the corporate network infrastructure and how to address these threats with new and innovative techniques. This approach is pragmatic in application and focuses on assimilation of existing data to present a functional rationale of attacks to anticipate and prepare for this coming year.