Contact Us
Article
Hacker Tools New Update | Download Directory |
| Windows | Linux | Mac OS X | Mobile | Assessment | Defense | Documents | Miscellaneous |
Hacker Tools » Download -> Windows-> Various » The Design and Evaluation of a Defense System

This Directory TOP
Poison Ivy 2.3.0
KiLLCMOS32 v.1.0 tool
Deep Freeze Standard 6.41.021.1973
KLogger 1.0
Spytech SpyAgent 7.56
Proxy Finder 2.5
USB Lock RP 5.27
WebGoat 5.0
DoSHTTP 2.5
MsN freezer forever
SHRest
An Introduction to Kernel Hacking
IP Hider 4.9
VPNetMon 1.0
Hide My Windows 1.11
FolderWizard 1.2
ID Directory Shield 3.5.0
FuzzyFiles
USB Secure 1.6.6
RemoveIT Pro Enterprise 7.17
SplitSecret 1.0
Keystroke Spy 2.30.11
The Design and Evaluation of a Defense System
ACSV 1.5.0
CallerIP 4.0d
BCWipe 5.03.2
School SMS 1.1
GPCS 2.6
WinFolder Lock Pro 1.1
Wolfeye 1.0
KeyGuard Hack Proof Security 2.0.11
Wise Disk Cleaner 7.66
Search

The Design and Evaluation of a Defense System

File Size: 157KB
Developer:
Description:     The Design and Evaluation of a Defense System
for Internet Worms

Many areas of society have become heavily dependent on services such as transportation facilities, utilities and so on that are implemented in part by large numbers of computers and communications links. Both past incidents and research studies show that a well-engineered Internet worm can disable such systems in a fairly simple way and, most notably, in a matter of a few minutes. This indicates the need for defenses against worms but their speed rules out the possibility of manually countering worm outbreaks. We present a platform that emulates the epidemic behavior of Internet active worms. For purposes of experimentation, the platform has been deployed on a cluster of computers to emulate worm outbreaks in very large networks. A wide variety of worm properties can be studied and network topologies of interest constructed. A reactive
control system, based on the Willow architecture and the OOPS policy framework, operates on top of the platform and provides a monitor/analyze/respond approach to deal with infections automatically. The logic driving the control system is synthesized from a formal specification, which is based on control rules correlating sensor events.
Download:   The Design and Evaluation of a Defense System

 

Sponsor Links

Sponsor Links

Share/Bookmark