确定ASA 5500防火墙的渗透阈值

J. Gill, Kazi Zunnurhain
{"title":"确定ASA 5500防火墙的渗透阈值","authors":"J. Gill, Kazi Zunnurhain","doi":"10.1145/3077286.3077305","DOIUrl":null,"url":null,"abstract":"The technology of today is dramatically more advanced than it was 30 years ago. With fiber optic cables becoming ever more present and the rapid expansion of storage, the volume of data passing through these devices is also becoming more abundant. Over time, it has become easier to launch many kinds of attacks. These attacks are often launched from one computer sending huge amounts of spoofed data for several minutes. It is no surprise then that multiple computers launching an attack will create a dire situation regardless of which PC or server is being attacked. A Denial of Service (DoS) attack occurs when an attacker floods a computer or server with illegitimate data so that the system will deny service to a legitimate user [3]. This occurs because that system is now lacking the resources to handle any more data. A Distributed DoS (DDoS) attack is the same idea, but amplified. A DDoS attack involves multiple systems striking a single target and flooding that target with data, overloading the target's computers, servers, and firewalls [3]. This often causes the physical devices to exhaust and deny legitimate requests. As if that wasn't enough, the attacker can plant a virus or Trojan in the system once they gain access to further sabotage the target. These types of attacks are very damaging to companies all around the world. That is where the Cisco ASA 5500 series firewall comes in. In this paper, we will be examining how efficiently a firewall of this type can defend against a DoS attack and a DDoS attack, and what adverse effects are displayed after the attacks have occurred.","PeriodicalId":91384,"journal":{"name":"Proceedings of the 2014 ACM Southeast Regional Conference","volume":"47 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2017-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Determining the Penetration Threshold for an ASA 5500 Firewall\",\"authors\":\"J. Gill, Kazi Zunnurhain\",\"doi\":\"10.1145/3077286.3077305\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The technology of today is dramatically more advanced than it was 30 years ago. With fiber optic cables becoming ever more present and the rapid expansion of storage, the volume of data passing through these devices is also becoming more abundant. Over time, it has become easier to launch many kinds of attacks. These attacks are often launched from one computer sending huge amounts of spoofed data for several minutes. It is no surprise then that multiple computers launching an attack will create a dire situation regardless of which PC or server is being attacked. A Denial of Service (DoS) attack occurs when an attacker floods a computer or server with illegitimate data so that the system will deny service to a legitimate user [3]. This occurs because that system is now lacking the resources to handle any more data. A Distributed DoS (DDoS) attack is the same idea, but amplified. A DDoS attack involves multiple systems striking a single target and flooding that target with data, overloading the target's computers, servers, and firewalls [3]. This often causes the physical devices to exhaust and deny legitimate requests. As if that wasn't enough, the attacker can plant a virus or Trojan in the system once they gain access to further sabotage the target. These types of attacks are very damaging to companies all around the world. That is where the Cisco ASA 5500 series firewall comes in. In this paper, we will be examining how efficiently a firewall of this type can defend against a DoS attack and a DDoS attack, and what adverse effects are displayed after the attacks have occurred.\",\"PeriodicalId\":91384,\"journal\":{\"name\":\"Proceedings of the 2014 ACM Southeast Regional Conference\",\"volume\":\"47 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2014 ACM Southeast Regional Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3077286.3077305\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2014 ACM Southeast Regional Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3077286.3077305","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

今天的技术比30年前先进得多。随着光纤电缆的日益普及和存储容量的迅速扩大,通过这些设备的数据量也变得越来越大。随着时间的推移,发起各种攻击变得越来越容易。这些攻击通常是从一台计算机发起的,在几分钟内发送大量的欺骗数据。因此,无论哪台PC或服务器受到攻击,多台计算机发起攻击都会造成可怕的局面,这一点也不奇怪。当攻击者向计算机或服务器发送大量非法数据,从而使系统拒绝向合法用户提供服务时,就会发生拒绝服务(DoS)攻击[3]。这是因为该系统现在缺乏处理更多数据的资源。分布式DoS (DDoS)攻击是相同的思想,但被放大了。DDoS攻击涉及多个系统攻击单个目标,并向目标发送大量数据,使目标的计算机、服务器和防火墙过载[3]。这通常会导致物理设备耗尽并拒绝合法请求。如果这还不够,攻击者可以在系统中植入病毒或木马,一旦他们获得访问权限,进一步破坏目标。这些类型的攻击对世界各地的公司都是非常具有破坏性的。这就是思科ASA 5500系列防火墙的用武之地。在本文中,我们将研究这种类型的防火墙如何有效地防御DoS攻击和DDoS攻击,以及攻击发生后显示的不利影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Determining the Penetration Threshold for an ASA 5500 Firewall
The technology of today is dramatically more advanced than it was 30 years ago. With fiber optic cables becoming ever more present and the rapid expansion of storage, the volume of data passing through these devices is also becoming more abundant. Over time, it has become easier to launch many kinds of attacks. These attacks are often launched from one computer sending huge amounts of spoofed data for several minutes. It is no surprise then that multiple computers launching an attack will create a dire situation regardless of which PC or server is being attacked. A Denial of Service (DoS) attack occurs when an attacker floods a computer or server with illegitimate data so that the system will deny service to a legitimate user [3]. This occurs because that system is now lacking the resources to handle any more data. A Distributed DoS (DDoS) attack is the same idea, but amplified. A DDoS attack involves multiple systems striking a single target and flooding that target with data, overloading the target's computers, servers, and firewalls [3]. This often causes the physical devices to exhaust and deny legitimate requests. As if that wasn't enough, the attacker can plant a virus or Trojan in the system once they gain access to further sabotage the target. These types of attacks are very damaging to companies all around the world. That is where the Cisco ASA 5500 series firewall comes in. In this paper, we will be examining how efficiently a firewall of this type can defend against a DoS attack and a DDoS attack, and what adverse effects are displayed after the attacks have occurred.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信