Increasing attacker workload with virtual machines

@article{Kuhn2011IncreasingAW,
  title={Increasing attacker workload with virtual machines},
  author={Stephen Kuhn and Stephen Taylor},
  journal={2011 - MILCOM 2011 Military Communications Conference},
  year={2011},
  pages={2176-2181}
}
Much of the traffic in modern computer networks is conducted between clients and servers, rather than client-to-client. As a result, servers represent a high-value target for collection and analysis of network traffic. The observe, orient, decide, and act (OODA) loop for network attack involves surveillance, to determine if a vulnerability is present, selection of an appropriate exploit, use of the exploit to gain access, and persistence for a time sufficient enough to carry out some effect… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-6 OF 6 CITATIONS

Bear -- A Resilient Kernel for Tactical Missions

  • MILCOM 2013 - 2013 IEEE Military Communications Conference
  • 2013
VIEW 1 EXCERPT
CITES BACKGROUND

Intended effects of cyber resiliency techniques on adversary activities

  • 2013 IEEE International Conference on Technologies for Homeland Security (HST)
  • 2013
VIEW 1 EXCERPT
CITES BACKGROUND

A forensic hypervisor for process tracking and exploit discovery

  • MILCOM 2012 - 2012 IEEE Military Communications Conference
  • 2012
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…