A structuring concept for securing modern day computing systems
Orhio Mark Creado, Phu Dung Le, et al.
ICCS 2002
Advances in communication technologies have drastically affected the realms of business, education, governments, and even the interaction of individuals. However, these advancements suffer greatly from hacking; as a result, many security countermeasures have been proposed. Nonetheless, the gap between successful hacking attempts and current security countermeasures is remarkable. The presence and success rate of hacking attempts are due to many reasons, including the emergence of relevant technologies (software and hardware) that aid hacking, complexity of hacking strategies that make them difficult to thwart, and neglecting the behavior of hackers in the design of hardware and software today. Fortunately, sophisticated hackers develop suitable hacking strategies for nominated victims based on gathered information through a prior step called scanning. Scanning provides hackers with necessary information including IP addresses, operating systems, running services and open ports in victims' infrastructures. In this article, we propose an active defense system that targets scanning properties and makes collecting necessary information about the protected infrastructure impractical, rendering the development of suitable hacking strategies against protected infrastructure nearly impossible.
Orhio Mark Creado, Phu Dung Le, et al.
ICCS 2002
Saad Abdullah Alsunbul, Phu Dung Le, et al.
ISD 2016
Saad Abdullah Alsunbul, Phu Dung Le, et al.
ICOIN 2016
Orhio Mark Creado, Phu Dung Le, et al.
CEC 2015