TY - GEN
T1 - Implementing a "moving target" system to protect servers
AU - Taylor, Curtis
AU - Shue, Craug
PY - 2011
Y1 - 2011
N2 - On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. Current methods to prevent such automated attacks are limited in that they are application-specific or fail to block attackers. While attackers have a low success rate, they compensate for it in volume. In order to have high throughput, attackers take shortcuts and break protocols. We address these issues by implementing a system that can detect malicious activity and block attacks. This system was then tested on a network, and we found that not only is this system conceivable, it is effective and has low overhead.
AB - On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. Current methods to prevent such automated attacks are limited in that they are application-specific or fail to block attackers. While attackers have a low success rate, they compensate for it in volume. In order to have high throughput, attackers take shortcuts and break protocols. We address these issues by implementing a system that can detect malicious activity and block attacks. This system was then tested on a network, and we found that not only is this system conceivable, it is effective and has low overhead.
KW - DNS
KW - Network
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84862892389&partnerID=8YFLogxK
U2 - 10.1145/2179298.2179350
DO - 10.1145/2179298.2179350
M3 - Conference contribution
AN - SCOPUS:84862892389
SN - 9781450309455
T3 - ACM International Conference Proceeding Series
BT - 7th Annual Cyber Security and Information Intelligence Research Workshop
T2 - 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11
Y2 - 12 October 2011 through 14 October 2011
ER -