A Study on Monitoring and Protecting Computer System against Interception Threat

Perfect protection against all system threats is considered to be impossible. The problem of monitoring against the threats has been an issue in literature, but its progress has not yet been met any practical need. Further, the inherent complexity of the problem in terms of any known approaches gives firm impressions that there are no practical solutions, and so fewer challenges have been made than those against virus and worms. This paper presents a new challenge of setting up traps against most interception threats that try to copy or read illicitly programs or data. Figuratively, traps are set up on the place where any legitimate program could not reach. The proposed technique uses sensor objects and is considered to be the best way of detecting unknown interception threats.

[1]  Carl E. Landwehr,et al.  A taxonomy of computer program security flaws , 1993, CSUR.

[2]  Karl N. Levitt,et al.  Towards a testbed for malicious code detection , 1991, COMPCON Spring '91 Digest of Papers.

[3]  John McHugh,et al.  Intrusion and intrusion detection , 2001, International Journal of Information Security.

[4]  Carl E. Landwehr,et al.  A Taxonomy of Computer Program Security Flaws, with Examples , 1993 .

[5]  Gerald Tesauro,et al.  Neural networks for computer virus recognition , 1996 .

[6]  Computer Staff,et al.  Compcon Spring 91 , 1991 .

[7]  N. D. Durie,et al.  Digest of papers , 1976 .

[8]  Thierry Lecroq,et al.  Handbook of Exact String Matching Algorithms , 2004 .

[9]  Gary McGraw,et al.  ITS4: a static vulnerability scanner for C and C++ code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[10]  M. Bishop Vulnerabilities Analysis , 1967 .

[11]  John Ray Maximum Linux security , 2001 .