Virus tracking software 'draw lines' for hackers
Programs that monitor and record unusual phenomena on the Internet because security companies set up secrets are being discovered by hackers and take advantage of their attacks.
Like surveillance cameras, programs called sensors are often hidden to avoid detection and response by hackers.Based on this program, Internet management centers can make announcements about changes in network activity, to assist analysts to track and find solutions.
However, in the "Combining Internet tracking software with reaction probe" at the Usenix Security Symposium on July 4 in the US, the University of Wisconsin research team recommended that Hackers can still locate sensors to perform nefarious behaviors without fear of being detected.John Bethencourt, one of the study's authors, said it was the announcements of network management centers that suggested the attacker wrote the algorithm to determine the program.All the hackers have to do is to populate the IP address with information packets and then check to see if this action appears in the notification.If not, "can safely conclude that the address is not under control," Bethencourt said.
After opening a fake attack on random IP addresses on the SANS network (USA), Bethencourt group did not need a week to discover and identify reconnaissance programs in this network and many other similar networks.
Some Japanese researchers also made similar conclusions in the "Internet Vulnerability Control Program" report.They claim to be able to create some reconnaissance software algorithms in a relatively short period of time.
"We believe that a new Internet threat has been discovered," the team said."This is not a threat to the server system, but a higher level threat - the system is built to protect server security."
However, both groups affirmed that the level of danger would be eliminated if SANS and other management centers did not report details of the network activity diagram.Moreover, the expansion of IPv6, the new Internet generation, can also prevent attacks with longer IP addresses.
You should read it
- Fix the problem of 'dead' Internet connection
- The alarming increase in the number of attacks targeted at IoT devices
- The best network configuration management tools and software
- The most dangerous places on the Web
- The cybersecurity tools that every business should know
- Remote UPS management via network
- More than 1 million computers are infected by hackers
- World hackers in China
May be interested
- How to draw straight lines and lines in Word 2019, 2016, 2013, 2010 and 2007how to draw straight lines and lines in word 2019, 2016, 2013, 2010, 2007. shapes is a great tool to help you create shapes and diagrams as you want in word. in this article helps you create straight lines in word fastest and most complete.
- Virus prevention experience (part 2)an effective and sure defense model is to set up multiple defense lines, which are external defenses with hard firewalls (integrated in routers), soft firewalls (computer software), anti-virus software , antispyware ... and then have to update fixes for security holes
- Learn super viruses that are threatening the global industryhighly skilled hackers can use public information about code known as the stuxnet virus to develop attack variants in many industries.
- Coreldraw - Lesson 9: Road drawing tools (continued)the pen tool is used to draw lines, curves and closed areas. with the pen tool, draw the curves faster. the drawing is similar to the bezier tool, but according to the drawing line with the cursor, it is easier to navigate.
- How to remove Adware Tracking Cookie when a computer is infectedadware tracking cookie is a commonly used form today to display advertisements suitable to users. so how do you get rid of this annoying tracking behavior?
- Hackers use a map to track the situation of the Corona virus to spread malwaresecurity researchers have discovered many fake covid-19 tracking maps, which when opened will unknowingly allow malware to infiltrate the computer.
- Hackers take advantage of Microsoft Defender's 8-year-old weakness to bypass the virus detection systemhackers take advantage of the weakness of microsoft defender anti-virus software to learn the locations excluded from the scan and plant malware there.
- How to draw mind maps using PowerPointhow to draw mind maps using powerpoint. similar to drawing a mind map with word, with powerpoint you can also use tools to draw shapes and lines to be able to draw a simple mind map.
- Install Unikey, Vietkey is not properly threatening computer securityif the websites download vietnamese typing support software hacked by hackers, it is possible that all personal information that users enter on the computer will be recorded.
- How to Draw Basic Shapes Using Open Office Drawopenoffice has its own suite of software that matches the versatility and strength of ms office and, being open source, it is free. read this article to learn how to draw basic shapes using openoffice draw. you can draw both 2d and 3d...