Doc, Wyatt, and Virgil: prototyping storage jamming defenses

Describes progress to date on three prototype tools for detecting storage jamming (or information warfare) attacks. One prototype (Doc) uses a replay defense; another (Wyatt) uses logical replication, and the third (Virgil) can be used to determine the source and pattern of a detected attack. Three prototype jammers are used to test the effectiveness of the defenses. Initial experiments have shown that access control, encryption, auditing and virus detection do not prevent or detect storage jamming. The prototype tools have been effective in detecting the same attacks. Object-oriented data storage may require the use of application-specific techniques for applying checksums.

[1]  John P. McDermott Replication Does Survive Information Warfare Attacks , 1997, DBSec.

[2]  John P. McDermott,et al.  Towards a model of storage jamming , 1996, Proceedings 9th IEEE Computer Security Foundations Workshop.

[3]  John P. McDermott,et al.  Storage Jamming , 1995, DBSec.

[4]  Sushil Jajodia,et al.  Surviving information warfare attacks on databases , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).

[5]  P. S. Tasker,et al.  DEPARTMENT OF DEFENSE TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA , 1985 .