{"title":"使用Windows注册表的TTL转换的代理攻击","authors":"W. Park, K. Park, Keon il Heo, K. Kook","doi":"10.1109/ICISA.2010.5480287","DOIUrl":null,"url":null,"abstract":"As we can see from the recent cyber terrors, the cyber terror is becoming more complicated, intelligent, and causing more damage. To react more effectively to the future cyber terrors, it will be necessary to anticipate new cyber terror techniques and devise the preventive measures for the possible vulnerabilities of the system before the hackers actually disable the system. This paper designs and implements new technique for the cyber terror. It transforms the TTL value of the window registry to a smaller value than needed. Then, the packets are discarded before they reach the destination and the connection to the destination host cannot be established.","PeriodicalId":313762,"journal":{"name":"2010 International Conference on Information Science and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Agent Attacks Using a TTL Transformation of Windows Registry\",\"authors\":\"W. Park, K. Park, Keon il Heo, K. Kook\",\"doi\":\"10.1109/ICISA.2010.5480287\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As we can see from the recent cyber terrors, the cyber terror is becoming more complicated, intelligent, and causing more damage. To react more effectively to the future cyber terrors, it will be necessary to anticipate new cyber terror techniques and devise the preventive measures for the possible vulnerabilities of the system before the hackers actually disable the system. This paper designs and implements new technique for the cyber terror. It transforms the TTL value of the window registry to a smaller value than needed. Then, the packets are discarded before they reach the destination and the connection to the destination host cannot be established.\",\"PeriodicalId\":313762,\"journal\":{\"name\":\"2010 International Conference on Information Science and Applications\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Conference on Information Science and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISA.2010.5480287\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Conference on Information Science and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISA.2010.5480287","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Agent Attacks Using a TTL Transformation of Windows Registry
As we can see from the recent cyber terrors, the cyber terror is becoming more complicated, intelligent, and causing more damage. To react more effectively to the future cyber terrors, it will be necessary to anticipate new cyber terror techniques and devise the preventive measures for the possible vulnerabilities of the system before the hackers actually disable the system. This paper designs and implements new technique for the cyber terror. It transforms the TTL value of the window registry to a smaller value than needed. Then, the packets are discarded before they reach the destination and the connection to the destination host cannot be established.