{"title":"Agent Attacks Using a TTL Transformation of Windows Registry","authors":"W. Park, K. Park, Keon il Heo, K. Kook","doi":"10.1109/ICISA.2010.5480287","DOIUrl":null,"url":null,"abstract":"As we can see from the recent cyber terrors, the cyber terror is becoming more complicated, intelligent, and causing more damage. To react more effectively to the future cyber terrors, it will be necessary to anticipate new cyber terror techniques and devise the preventive measures for the possible vulnerabilities of the system before the hackers actually disable the system. This paper designs and implements new technique for the cyber terror. It transforms the TTL value of the window registry to a smaller value than needed. Then, the packets are discarded before they reach the destination and the connection to the destination host cannot be established.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Information Science and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISA.2010.5480287","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
As we can see from the recent cyber terrors, the cyber terror is becoming more complicated, intelligent, and causing more damage. To react more effectively to the future cyber terrors, it will be necessary to anticipate new cyber terror techniques and devise the preventive measures for the possible vulnerabilities of the system before the hackers actually disable the system. This paper designs and implements new technique for the cyber terror. It transforms the TTL value of the window registry to a smaller value than needed. Then, the packets are discarded before they reach the destination and the connection to the destination host cannot be established.