File:Malware mimics for network security assessment (IA malwaremimicsfor109455749).pdf

Page contents not supported in other languages.
This is a file from the Wikimedia Commons
Source: Wikipedia, the free encyclopedia.
Go to page
next page →
next page →
next page →

Original file(1,275 × 1,650 pixels, file size: 712 KB, MIME type: application/pdf, 130 pages)

Summary

Malware mimics for network security assessment   (Wikidata search (Cirrus search) Wikidata query (SPARQL)  Create new Wikidata item based on this file)
Author
Salevski, Paul M.
Taff, William R.
image of artwork listed in title parameter on this page
Title
Malware mimics for network security assessment
Publisher
Monterey, California. Naval Postgraduate School
Description

For computer network infiltration and defense training within the Defense, the use of Red Teams results in the most effective, realistic, and comprehensive training for network administrators. Our thesis is meant to mimic that highly trained adversary. We developed a framework that would exist in that operational network, that mimics the actions of that adversary or malware, that creates observable behaviors, and that is fully controllable and configurable. The framework is based upon a client-server relationship. The server is a Java multi-threaded server that issues commands to the Java client software on all of the hosts of the operational network. Our thesis proved that commands could be sent to those clients to generate scanning behavior that was observable on the network, that the clients would generate or cease their behavior within five seconds of the issuance of the command, and that the clients would return to a failsafe state if communication with the command and control server was lost. The framework that was created can be expanded to control more than twenty hosts. Furthermore, the software is extensible so that additional modules can be created for the client software to generate additional and more complex malware mimic behaviors.


Subjects: Communication; Network analysis
Language English
Publication date March 2011
Current location
IA Collections: navalpostgraduateschoollibrary; fedlink
Accession number
malwaremimicsfor109455749
Source
Internet Archive identifier: malwaremimicsfor109455749
https://archive.org/download/malwaremimicsfor109455749/malwaremimicsfor109455749.pdf
Permission
(Reusing this file)
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, may not be copyrighted.

Licensing

Public domain
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code. Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current17:24, 22 July 2020Thumbnail for version as of 17:24, 22 July 20201,275 × 1,650, 130 pages (712 KB)FEDLINK - United States Federal Collection malwaremimicsfor109455749 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #21066)
No pages on the English Wikipedia use this file (pages on other projects are not listed).

Metadata