Foiling the wiley hacker: more than analysis and containment

H. Kluepfel
{"title":"Foiling the wiley hacker: more than analysis and containment","authors":"H. Kluepfel","doi":"10.1109/CCST.1989.751947","DOIUrl":null,"url":null,"abstract":"This paper will look at the methods and tools used by system Intruders. It will analyze the development of the hacker, his motivation, his environment and the burglar tools used for system intrusion. It will also probe the nature of the vulnerable networking environments that are the target of intrusions. More important, it will address turning the tables on these Intruders with their own tools and techniques. Besides reacting to attacks, there are many opportunities to learn from the intruders and design that knowledge into now defensive solutions for securing computer based systems. Having presented the problem, the paper will present a strategy to defend and thwart such intrusions in our Increasingly networked and distributed computing and telecommunications environments.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"2000 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings. International Carnahan Conference on Security Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1989.751947","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

This paper will look at the methods and tools used by system Intruders. It will analyze the development of the hacker, his motivation, his environment and the burglar tools used for system intrusion. It will also probe the nature of the vulnerable networking environments that are the target of intrusions. More important, it will address turning the tables on these Intruders with their own tools and techniques. Besides reacting to attacks, there are many opportunities to learn from the intruders and design that knowledge into now defensive solutions for securing computer based systems. Having presented the problem, the paper will present a strategy to defend and thwart such intrusions in our Increasingly networked and distributed computing and telecommunications environments.
挫败狡猾的黑客:不仅仅是分析和遏制
本文将研究系统入侵者使用的方法和工具。本文将分析黑客的发展,黑客的动机,黑客所处的环境以及入侵系统所使用的防盗工具。它还将探索易受攻击的网络环境的本质,这些环境是入侵的目标。更重要的是,它将解决利用入侵者自己的工具和技术扭转局面的问题。除了对攻击作出反应之外,还有很多机会向入侵者学习,并将这些知识设计成现在的防御解决方案,以保护基于计算机的系统。在提出问题之后,本文将提出在我们日益网络化和分布式计算和电信环境中防御和阻止此类入侵的策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信