Computers under Attacks!
نویسندگان
چکیده
The war metaphor seems to establish itself as soon as we deal with computer viruses. The concept of war is a central topic of political philosophy. The relationships between " hackers " and " crackers " and information technology world are based on power relations, whose issues are politic, economic and epistemological. We wonder whether the computer disease phenomenon is a modern representation of the war and the relationships of power, as it is suggested in Foucault from Les Mots et Les Choses. So, it is legitimate to compare the aspects of this war with the classical analyses of war, which in the literature are founded by the classical Greco-Roman philosophers, or the modern ones such as Machiavelli or Clausewitz.
منابع مشابه
Minimization of Security Alerts under Denial of Service Attacks in Grid Computing Networks
Grid computing networks aggregate huge computing power that they need for solving different scientific problems. This power can be used for attacking the grid’s components as well as outside computers. Attacks such as the Denial of Service (DoS) could be used to target user machines, servers, and security management solutions to sabotage the normal operations of the grid computing network. In t...
متن کاملSide channel parameter characteristics of code injection attacks
Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...
متن کاملExamining Smart-Card Security under the Threat of Power Analysis Attacks
ÐThis paper examines how monitoring power consumption signals might breach smart-card security. Both simple power analysis and differential power analysis attacks are investigated. The theory behind these attacks is reviewed. Then, we concentrate on showing how power analysis theory can be applied to attack an actual smart card. We examine the noise characteristics of the power signals and deve...
متن کاملSecurity Analysis of AES Using Functionality Fault Model
Security of cryptographic circuits is a major concern. Smartcards are targeted by sophisticated attacks like fault attacks that combine physical disturbance and cryptanalysis. We propose a methodology and a tool (PAFI) to analyse the robustness of circuits under fault attacks using fault injection in simulation. The number of injection is reduced by taking into account the function of the latch...
متن کاملOn Widening the Scope of Attack Recognition Languages
The Intrusion Detection (ID) community has developed numerous proposals for languages with which to describe signatures of attacks on computers and networks. By and large, these languages provide means for describing sequences of specific events indicative of attacks through their presence or absence in the history of some computational system. This note argues from examples that meeting the ne...
متن کاملSustaining Availability of Web Services under Distributed Denial of Service Attacks
The recent tide of Distributed Denial of Service (DDoS) attacks against high-profile web sites demonstrate how devastating DDoS attacks are and how defenseless the Internet is under such attacks. We design a practical DDoS defense system that can protect the availability of web services during severe DDoS attacks. The basic idea behind our system is to isolate and protect legitimate traffic fro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006