XRDS

Crossroads The ACM Magazine for Students

Sign In

Association for Computing Machinery

Articles Tagged: Intrusion/anomaly detection and malware mitigation

Articles & Features

How 1 million app calls can tell you a bit about malware

DEPARTMENT: Blogs

How 1 million app calls can tell you a bit about malware

The XRDS blog highlights a range of topics from conference coverage, to security and privacy, to CS theory. Selected blog posts, edited for print, are featured in every issue. Please visit xrds.acm.org/blog to read each post in its entirety. If you are interested in joining as a student blogger, please contact us.

By Dimitris Mitropoulos, September 2017

PDF | HTML | In the Digital Library

Exploring the Risks to Identity Security and Privacy in Cyberspace

SECTION: Features

Exploring the Risks to Identity Security and Privacy in Cyberspace

Cyberspace, a world of great promise, but also, of great peril. Pirates, predators, and hackers galore, are you and your online identity at risk in this wild frontier?

By Jason R. C. Nurse, March 2015

PDF | HTML | In the Digital Library

Timing attacks on RSA

By Wing H. Wong, May 2005

PDF | HTML | In the Digital Library

Introduction

By William Stevenson, September 2004

PDF | HTML | In the Digital Library

Computer security and intrusion detection

Computer attacks are now commonplace. By connecting your computer to the Internet, you increase the risk of having someone break in, install malicious programs and tools on it, and possibly use it to attack other machines on the Internet by controlling it remotely.Several major banks have been subject to attacks, in which attackers gained access into customers' accounts and viewed detailed information about the activities on these accounts. In some instances the attackers stole credit card information to blackmail e-commerce companies by threatening to sell this information to unauthorized entities. Several online trading companies and e-commerce sites were shut down temporarily due to major packet flood attacks, also known as Denial-of-Service (DoS) attacks, causing these companies to lose revenue, customer satisfaction, and trust [10]. A major software development company discovered that attackers had broken into its network and stolen the source code for future releases of its popular products. Just recently, the source code of the future flagship product belonging to a major software development company was stolen and made publicly available on the Internet.In order to combat this growing trend of computer attacks, both academic and industry groups have been developing systems to monitor networks and systems and raise alarms of suspicious activities. These systems are called Intrusion Detection Systems (IDS).

By Khaled Labib, September 2004

PDF | HTML | In the Digital Library