Thursday, March 23, 2006

The Art of Digital War - [Part 1]

The objective of this article is to identify the core issues around a digital intrusion. What are the key elements in Digital Intrusion? What is the impact on the enterprise? How do you classify the Intruders? How do you categorize your Assets?
Latest CERT reports a total of 5990[1] vulnerabilities for the year 2005 an increase of 58.5% from the year 2004 and a 3402% increase from the year 1995. Usually vulnerability in an application is due to un-identified bug in the code. However there are times when backdoors written explicitly in some application to get into a users machine.
To find out more about this, read more in my blog Security Datamining / The Art of Digital War


[1] 2005 Vulnerability List http://www.cert.org/stats/cert_stats.html

Wednesday, March 22, 2006

Virus / Worm Behavior Analysis

Viruses of the new era posses attack models, similar to a sophisticated Hacker (or Cracker). It scans your network, exploits your vulnerable applications, creates backdoors for control, and does DoS (Denial of Service) attacks against other systems and even fights other viruses and worms to show supremacy!
Its time to re-look at these Malwares from a completely different perspective to contain and prevent these Malwares from attacking your networks and other critical assets.

To find out more about this, read more in my blog
Security Datamining / Virus and Worm Behavior Analysis

Wednesday, March 08, 2006

The Art of Digital War - [Part 2] Alarms in Intrusion Detection Systems

The following table shows a set of words and its frequency.
Word
Frequency
Word
Frequency
Word
Frequency
The
1101
I
561
In
414
And
878
You
544
It
414
To
726
My
508
That
389
Of
657
A
498
….
…..
I know you must be wondering about, frequency related to what? That’s the key!
To find out more about this, read more in my blog Security Datamining / Alarms in Intrusion Detection Systems