- Full text PDF available (2)
An experimental sniffer detector, SnifferWall, is presented. Based on an open architecture, it combines between detecting hosts in promiscuous mode and hosts replaying information sniffed from honey pots. Two majors methods of detection are used: ¯ A detection based on MAC addresses. ¯ A decoy-based detection method.
When building a model for degradable computer systems, it is not sufficient to merely quantify reliability and performance measures. These indices must be mathematically sound if they are to be used to design such systems in an optimal way. The paper presents an analysis of design optimisation for degradable computer systems and shows how this particular… (More)
Network sniffing was considered as a major threat to network and web application. Every device connected to the Ethernet-network receives all the data that is passed on the segment. By default the network card processes only data that is addressed to it. However listening programs turn network card in a mode of reception of all packets – called promiscuous… (More)