on-line security: attacks and solutions

Upload: evren-kuecuekkaya

Post on 04-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/30/2019 On-line security: attacks and solutions

    1/17

    EVRENKUCUKKAYA

    2012

    E-COMMERCE SEMINAR

    Elias A. Hadzilias, PhD

    NTUA

    Assignment:

    On-line security: attacks and solutions

    I S G I N T E R N A T I O N A L M B A

  • 7/30/2019 On-line security: attacks and solutions

    2/17

    1

    EVREN KUCUKKAYA

    Table of Context1. INTRODUCTION ................................................................................................................................... 3

    2. MAIN TYPES OF MALWARE ................................................................................................................. 4

    2.1. Computer Viruses ............................................................................................................................. 4

    2.1. Computer Worms ............................................................................................................................. 5

    2.3. Trojan Horses .................................................................................................................................... 6

    2.4. Spyware ............................................................................................................................................ 6

    2.5. Backdoor ........................................................................................................................................... 6

    2.6. Spams ............................................................................................................................................... 7

    2.7. Keyloggers ........................................................................................................................................ 7

    2.8. Browser Hijacking ............................................................................................................................. 7

    2.9. Dialers ............................................................................................................................................... 7

    2.10 Rootkit ............................................................................................................................................. 7

    2.11. Exploits ........................................................................................................................................... 7

    3. UP-TO-DATE MALWARE ...................................................................................................................... 8

    3.1. Adware ............................................................................................................................................. 8

    3.2. Parasiteware ..................................................................................................................................... 8

    3.3. Thiefware .......................................................................................................................................... 8

    3.4. Pestware ........................................................................................................................................... 8

    3.5. Browser Helper Object, BHO ............................................................................................................ 8

    3.6. Remote Administration Tool, RAT .................................................................................................... 8

    3.7. Commercial RAT ............................................................................................................................... 8

    3.8. Botnet ............................................................................................................................................... 9

    3.9. Flooder ............................................................................................................................................. 9

    3.10. Hostile ActiveX ................................................................................................................................ 9

    3.11 Hostile Java ...................................................................................................................................... 9

    3.12. Hostile Script .................................................................................................................................. 9

    3.13. IRC Takeover War ........................................................................................................................... 9

    3.14. Nuker .............................................................................................................................................. 9

    3.15. Packer ............................................................................................................................................. 9

    3.16. Binder ............................................................................................................................................. 9

    3.17. Password Capture and Password Hijacker ................................................................................... 10

    3.18. Password Cracker ......................................................................................................................... 10

    3.19. Key Generator .............................................................................................................................. 10

  • 7/30/2019 On-line security: attacks and solutions

    3/17

    2

    EVREN KUCUKKAYA

    3.20. E-mail Bomber .............................................................................................................................. 10

    3.21. Mass Mailer .................................................................................................................................. 10

    3.22. E-mail Harvester ........................................................................................................................... 10

    3.23. Web Bugs ...................................................................................................................................... 10

    3.24. Hoax .............................................................................................................................................. 10

    3.25. Phishing ........................................................................................................................................ 10

    3.26. Web Scam and Fraud.................................................................................................................... 10

    4. PROVIDING ONLINE SECURITY ........................................................................................................... 11

    4.1. Firewall ........................................................................................................................................... 11

    4.1.1 Types of Firewall ........................................................................................................................... 11

    4.1.2. Positive Effects of the Firewall .................................................................................................... 11

    4.1.3. Negative Effects of the Firewall................................................................................................... 11

    4.2. Data Encryption .............................................................................................................................. 12

    4.2.1. Symmetric-key Encryption .......................................................................................................... 12

    4.2.2. Asymmetric-key Encryption ........................................................................................................ 12

    4.3. Antivirus Software .......................................................................................................................... 12

    4.3.1. Historical Development of Antivirus Software ............................................................................ 13

    4.3.1.1. First-generation software ......................................................................................................... 13

    4.3.1.2. The second-generation software ............................................................................................. 13

    4.3.1.3. Third-generation software ....................................................................................................... 13

    4.3.1.4. The fourth-generation software ............................................................................................... 13

    4.3.2. Advanced anti-virus techniques .................................................................................................. 14

    4.3.2.1. General analysis........................................................................................................................ 14

    4.3.2.2. Digital immune system ............................................................................................................. 14

    4.4. Internet Protocol Security (IPSec) .................................................................................................. 14

    5. CONCLUSIONS ................................................................................................................................... 14

    REFERENCES .......................................................................................................................................... 15

  • 7/30/2019 On-line security: attacks and solutions

    4/17

    3

    EVREN KUCUKKAYA

    1. INTRODUCTION

    Information security can be defined as protection of knowledge as an asset for any damages,

    prevention of acquisition by unwanted users of the right technology, properly using the right

    purpose and in all kinds of information. The purpose of security in computer technology,

    individuals and organizations face in using these technologies taking measures by makingthreats and advance hazards analysis.

    Recently with the development of computer technology in information and computer security

    at the beginning of the most serious threats come from malicious software. Malicious

    software or Malware is the general name for unwanted softwaredesigned to cause damage on

    or disrupt the work on the other machines on an infected computer system or network [1].

    Malwares are infecting to the other systems without the knowledge the user or user systems

    by tricking them [2].

    Scum ware referred to as malware, be formed with almost any programming or scriptinglanguage, or can be transported in several files [3].

    In terms of historical development, types of malware, can be examined in four generations [2,

    4]:

    1. Generation (1987-1995): Computer viruses, especially in this period that dominated by

    DOS viruses, malicious software was infecting through the files and floppy disks. In 1995,

    their age closed by Windows 95, the first operating system with protected-mode operating

    system.

    2. Generation (1995-2000): In light of recent developments in the personal computer world

    especially on images, audio and video files with support for multi-media containing materials

    such as using Microsoft Word, Excel, and powerful capabilities that comes with office

    programs such as the macro language of a generation that uses the density of malware. The

    macro language of this period gave an huge opportunity to people who cannot able to use the

    machine language of Win32 platform. Macros are still in use, although this period ended with

    the spread of virus-scanning programs.

    3. Generation (1999-2002): Especially with the increase in Internet usage and e-mail

    communication amount of mass mailers increased in this generation, especially benefiting

    from the vulnerabilities of e-mail and internet browser programs. During this period, malware,

    are benefiting from the opportunities offered by the various scripting languages, or has chosen

    the path of transmission systems in the files attached to e-mails. E-mail filtering programs to

    block this kind of malicious software reached a certain saturation.

    4. Generation (2001 -): The most important difference from other generations on this

    generation which is still ongoing, no need for the assistance of a significant user to spread.

    This period begins with Code Red worm in 2001, malware, benefits from vulnerabilities in

    the system and programs. With this term types of malware has started to spread, especially

    serious consequences with the illegal and criminal damages. With this generation, types ofmalware that cannot replicate itself started to be seen such as keyboard listening systems.

  • 7/30/2019 On-line security: attacks and solutions

    5/17

    4

    EVREN KUCUKKAYA

    Malware that threaten ordinary users and systems are rapidly growing up, especially with the

    ease of motion brought by the Internet and network systems [1]. This situation can be likened

    to a war with technology that the good and the bad guys faced. During this fight, data, might

    be productive time and money has been lost while people find and cleaning, "structures of

    evil". For the prevention of malware and spyware, researchers and professional security

    experts identify such harmful elements, to develop new ways to destroy; users trained,

    educating, determined to close gaps in security and protection, the use of scanner and

    software and updating them, despite of all these efforts, attacks by malicious people and

    attack methods are increasing day by day [5].

    2. MAIN TYPES OF MALWARE

    In general, all Malware can exhibit different characteristics in terms of; life cycle, self-

    replication, autonomy, transmission mechanism, showing discrete or features of a virus, and

    protection mechanism. Types of malware, as exhibit different behaviours for any stage of thelife cycle such as; working towards a single purpose, without self-replication; can have some

    completely autonomous approach such need of user intervention; can be installed manually by

    malicious people themselves to the target computer system, may show resistance to protection

    structures that can detect or destroy it, entice these types of programs with various tactics [2].

    The most basic types of malware, malicious software, except that they first encountered in

    terms of development processes; are software with significant characteristic features,

    including major threats to the security of information and computer, that users are exposed to

    a quite common way.

    2.1. Computer Viruses

    Viruses are widely regarded as the most dangerous and the most ancient type of malware.

    Computer viruses inspired from the organisms are defined as small particles in infected cells,

    so-called biological viruses. Computer virus can run their own copies, place it to spread to

    other code or documentation, and multiply itself. Most virus programs have devastating

    effects, such as deleting important files or making host system completely broken. These

    viruses can spread through the network as part of a computer worm to spread even though

    they do not use network resources. Instead, infect target systems by such as floppy disk, CD

    or DVD media or by e-mail attachments. Most distinctive feature of viruses is that separating

    from other form of malware is the need of human interaction.The virus must be within the

    malicious code to be executed by a user. The user unwittingly spreads the virus by opening a

    file, reading an e-mail, a system boot or run an infected program [7, 8].

    There is four kind of viruses. These are;

    File viruses, Boot viruses, Macro viruses, and Script viruses.

  • 7/30/2019 On-line security: attacks and solutions

    6/17

    5

    EVREN KUCUKKAYA

    File viruses are types of virus that uses the file system to spread by copying themselves to

    executable files various directories, or contaminate the viral code on operating system.

    Boot viruses, by changing hard disk or floppy disk "Master Boot Record" make it work the

    code each time the computer viral sequences.

    Macro viruses use the macros which are starting to run with the programs that have strong

    macro support and using the desktop programs to start their files such as Microsoft Word and

    Excel.

    Script viruses can be written by using scripting languages like, VB (Visual Basic), JavaScript,

    BAT (batch file), PHP.

    2.1. Computer Worms

    With a structure similar to computer viruses, worms, such as viruses, do not add itself to otherexecutable programs or do not become part of this program. Worms, to spread to another

    program or do not require human interaction like viruses, are offering a self-replicating

    structures [10]. Among the most common methods used by the worm to spread, e-mail, FTP,

    HTTP and other Internet services. To spread worms, methods like taking advantages from the

    vulnerabilities of target system or using social engineering to make the users to run the worms

    using. Worms will not modify any other files, but they stand and replicate efficiently in

    memory. Worms use the operating system structures automatically performed and are usually

    invisible to users. Uncontrolled proliferation of worms can be recognizable when the system

    uses its resources excessively high or other processing tasks slowing or when it causes these

    tasks endings. The name of the worm comes from a science fiction novel written by John

    Brunner's in 1975, named "Shockwave Rider", from a program that spread itself over a

    computer network [11]. Computer Worms can be examined under the four groups; e-mail, IM

    (Internet Messaging), internet and network worms.

    E-mail worms spread of the most preferred method of malware that uses e-mails.

    "Internet Messaging" (IM) and Microsoft's MSN Messenger, AOL's AIM, IRC, ICQ, KaZaA,

    such as IM worms spread widely used for messaging services and network shares.

    Internet worms, worms only infect the machines connected to the Internet. This type worms,scans the internet to try to find the vulnerable computers, which has not installed the latest

    security updates, with the backdoor open, without a firewall.

    Another interesting species of worms are network worms, they replicate themselves to a

    shared folder or transforming to an interesting application or file name, the names that may

    seem useful. Users who are running these files on their computers are infected by the worm.

    Most of the worm being developed to run on one type of operating system. But the very near

    future super worms which include a "warhead" will emerge to work with Windows, Linux,

    Solaris, BSD and other operating systems.

  • 7/30/2019 On-line security: attacks and solutions

    7/17

    6

    EVREN KUCUKKAYA

    2.3. Trojan Horses

    Trojan Horse name is coming from the ancient novel Odysseus that was written by Homer.

    The novels tell the story of a wooden horse full with the soldiers given as a gift used to take

    the city of troy after the ten years of unsuccessful siege by opening the gates from inside at

    the late hours of night [12].

    Seen many examples in history that uses this trick to hide malicious software are known by

    the name of this legend. Trojan horses are malicious software disguised as legitimate

    software. Although the opposite examples are recent, such as viruses, Trojan horses cannot

    multiply themselves. A Trojan horse can bundle itself to a useful program or convince the

    users that it has a useful function for execute itself by the user. Except Trojan horses that

    damage to the system overall with a variety of ways other types of Trojan horses can be seen

    such as; PSW Trojans, Trojan backdoors, clickers, downloaders, droppers, proxies, spies,

    Annunciators and archive bombs.

    2.4. Spyware

    In Information and computer security, spyware is generally used in an ambiguous sense.

    Spyware is defined as software that provides a collection of the important information and the

    actions of the user and send this information to malicious people, without the user's

    information. Spyware, infect to the systems, especially by Internet users unwittingly,

    differently from the other malwares. Spyware, after infected the target system once do not

    need to spread or creating your own copy unlike viruses and worms. The purpose of spyware

    is to collect the requested information remain confidential on the selected system. Sometimes

    this information may even be important information such as a credit card number or

    identification [14]. In addition, commercial companies in order to determine user habits on the

    Internet can radiate spyware on the Internet [15].Transmitted without the knowledge of users'

    systems, spyware, one of the most important attacks carried out against privacy [10].

    2.5. Backdoor

    Backdoors are the methods that enable a person to skip the normal authentication process or

    enable remotely access to that computer who are aware to this structure established by cannot

    found by the standard examinations. Hackers who show a very laborious effort to infiltrate asystem, they want to add an easier way to access the system again. The most common back-

    door method is to keep open a door (port) that attached a listening agent on the target system.

    Backdoors, often confused with Trojans.

  • 7/30/2019 On-line security: attacks and solutions

    8/17

    7

    EVREN KUCUKKAYA

    2.6. Spams

    Spams, perhaps is one of the malware the most frequently encountered by users and have

    troubles in daily life. Spams are making peoples e-mail accounts busy with messages they do

    not want including advertising, product promotion and selling, or other bad purposes. To

    avoid the damage caused by spam type of e-mails, e-mail filtering software programs work asintegrated.

    2.7. Keyloggers

    These are the spywares which is capturing, holding, and sending the entries of users which is

    using keyboard to the attacker. Keyboard listening systems, except for the use of extremely

    dangerous consequences of malicious purposes, very useful application areas are also

    available [1]. As one of the most effective methods of obtaining information the keyboard

    listening systems are actually used since 1980s [17]. Most of the anti-spyware and anti-

    malware programs do not consider about the Keyloggers.

    2.8. Browser Hijacking

    Stripping browsers, also called the URL injection, are software leads to act web browser

    settings for all the time or only in certain regions, outside the user defined style [18]. Most

    simply, the browser opens the initial page shown in (homepage), could be make the desired

    site address. There is also showing the types of, the windows that contain inappropriate

    content or advertising (pop-up window), in addition [8].

    2.9. Dialers

    Dialers are often changes the target users internet providers number with an international

    phone number to make the user to pay large amount of call fee. After the dial-up connections

    this type of software are not using anymore.

    2.10 Rootkit

    Admin on UNIX operating systems, which means "root" name teams from the root user, the

    attacker after seizing control of a system, attached to the computer system software. Among

    the tools the team, deleting record (log) entries or hiding the attacker processes, tools to

    remove the traces of the attack and the attacker's system regulating the vehicles backdoors to

    facilitate the subsequent entries can be counted.

    2.11. Exploits

    Malicious software that can produce types of security attacks that target the specific

    vulnerability. This type of software is written in order to show the world just like the

    existence of this vulnerability, can also be used as a method of transmission of malicious

    programs, such as network worms [19].

  • 7/30/2019 On-line security: attacks and solutions

    9/17

    8

    EVREN KUCUKKAYA

    3. UP-TO-DATE MALWARE

    There are many types of malware type of malware, except as described above. There is not

    sufficient number of collectively source and study on this software. Only a small number of

    resources mention this software on the Internet can be found. The new generation of malware,

    changes shape by following the emerging technology or innovations.

    3.1. Adware

    Adware is not necessarily malware, but this kind of software would be using the methods,

    beyond the expected concept of freeware or shareware advertising. These types of programs

    make advertising by using pop-up windows or banners.

    3.2. Parasiteware

    Parasiteware is a type of advertising software that deletes links of the other companies thatgenerate revenue by mediating trail sites by using membership (affiliate) method to sell

    products.

    3.3. Thiefware

    Steal the membership of the commission by typing on the trail making cookies, redirecting

    directing to different sites applications, the current traffic on Internet browsers by opening

    new browser windows.

    3.4. Pestware

    Is a adware type of malicious software.

    3.5. Browser Helper Object, BHO

    A BHO written in malevolent purposes, by establishing the Internet browser, may collect any

    information that the user accessed the Internet, and secretly monitor the use of data [8].

    3.6. Remote Administration Tool, RATIs one of the most dangerous forms of malware when the target machine online giving

    unlimited access to this machine to the aggressor.

    3.7. Commercial RAT

    It is the use of any malicious purpose, without the user's permission or knowledge, normally

    produced as a remote administration tool for any commercial RAT program.

  • 7/30/2019 On-line security: attacks and solutions

    10/17

    9

    EVREN KUCUKKAYA

    3.8. Botnet

    Bot network (botnet) which is a type of remote management software is a network of a

    number of captured computers can be used for by malicious people to send spam, or sending

    worms or Trojan horses.

    3.9. Flooder

    DoS attacks, which causes disruption of service, by the methods of sending serial PING and

    SYN packages, intentionally excessive loads on the machine or a network connection

    software, is named by Ping of Death and SYN Flooder [15].

    3.10. Hostile ActiveX

    Internet Explorer software that was established the users' computers usually by illegally

    download (drive-by-download).

    3.11 Hostile Java

    3.12. Hostile Script

    VBS. WSH. JS. HTA. JSE and. VBE extension of text files can be called as aggressive script

    in terms of intent malicious contain.

    3.13. IRC Takeover War

    IRC (Internet Relay Chat), one of chat programs, has lost its popularity. IRC network has

    been disturbed by IRC wars for a long time. In order to facilitate the attack of any kind on

    IRC all the tools used in is classified as IRC war.

    3.14. Nuker

    Windows operating system properly unpatched or without firewall, DoS attack WinNuke

    machines used for the "nuke" the term (nuke: nuclear weapons), for the moment a variety of

    TCP / IP as the common name used for DoS attacks.

    3.15. Packer

    Utility programs that encrypting a file compression into a process. When the program runs

    automatically adds a header of the process file in memory [21].

    3.16. Binder

    Software that brings multiple files into one file that may be different types. Hiding Trojan

    horse like files in this software is too easy [22].

  • 7/30/2019 On-line security: attacks and solutions

    11/17

    10

    EVREN KUCUKKAYA

    3.17. Password Capture and Password Hijacker

    Spyware programs running on the system for recording to capture passwords entered [14].

    3.18. Password Cracker

    Tools to decrypt A password or an encrypted file [23, 24].

    3.19. Key Generator

    People who use these tools, can set up or copy the programs software without buying, as the

    authorized user can benefit.

    3.20. E-mail Bomber

    Malware which is bombarded target's e-mail inbox with thousands of e-mail.

    3.21. Mass Mailer

    Sending malicious viruses through e-mail software.

    3.22. E-mail Harvester

    E-mail Address Harvesters; transmit the e-mail addresses or address lists in computers, hard

    disks a variety of ways in unaware of the user, to a server.

    3.23. Web Bugs

    Web bug is an interesting and little-known technique in order to achieve who, how many

    times displays a HTML-based e-mail message or a web page, and the message information

    such as how long the interest by the ordinary user used.

    3.24. Hoax

    Aiming to users convince a non-existence of things all kinds of "trick", is classified as a hoax.

    3.25. Phishing

    Phishing (identity theft) to obtain bank account numbers, personal information such as credit

    card numbers, bank official, such as a message sent from an official institution that seems

    really e-mails from people.

    3.26. Web Scam and Fraud

    It is a type of fraud in an e-mail or via the Internet.

  • 7/30/2019 On-line security: attacks and solutions

    12/17

    11

    EVREN KUCUKKAYA

    And the some other known up-to-date malware are; Phreaking, Phone Breaking, Port Scanner,

    Probe Tool, Search Hijacker, Sniffer, Spoofer, Spyware Cookie, Tracking Cookie, PIE,

    Trickler, War Dialer and Wabbit.

    4. PROVIDING ONLINE SECURITY

    4.1. Firewall

    Task of firewalls is to create an active security system against potential attacks and

    threatening elements on the Internet. This task done by controlling only permitted services or

    network systems reachability to the presented or used sources of systems. If necessary by

    forming the private IP addressing systems used for the internal network environments to the

    generally IP addresses existing systems on the internet and hides the IP addressing used in

    internal networks and provide security.

    4.1.1 Types of Firewall

    Firewalls can filter network protocol in various layers. There is three main type of firewall;

    packet filtering firewalls, the circuit level firewalls and application-level firewalls.

    4.1.2. Positive Effects of the Firewall

    If a firewall will use properly it can control the incoming and outgoing traffic of the network.

    It can interfere of the unauthorized or external network users service access to the internalnetwork. At the same time can be interfere the internal users access to the external networks

    or services they do not have any privileges. Firewalls can be configured to provide access

    control services on many departments or other private networks.

    Firewalls can be configured to demand the credentials of the users. This provides network

    administrators to control access to resources and certain services of specific users. Identity

    verification also allows network administrators to monitor users activity and intrusion

    attempts.

    Firewalls can provide resources for auditing and record keeping. Configuring firewalls in this

    way can be observed and analysed the necessary information in the coming days. Additional

    layers services security can prevent from unwanted screening.

    4.1.3. Negative Effects of the Firewall

    In addition to many benefits of firewall solutions, there are also the negative effects.

    Firewalls can cause traffic bottleneck on some networks. Where all network traffic is

    compelled to pass through the firewall, there is a very high probability of experiencing

    network traffic congestion.

  • 7/30/2019 On-line security: attacks and solutions

    13/17

    12

    EVREN KUCUKKAYA

    In cases where the transition between networks only through a firewall, if the firewall is not

    configured correctly problems in traffic flow between networks can be experienced.

    All firewalls' need of continuous administrative support, general maintenance, software

    upgrades, security patches adds an additional burden on managers.

    4.2. Data Encryption

    Encryption / decryption are used to secure the file communication on personal computers or a

    computer network. Therefore, nowadays, the importance of encryption computers or

    computer networks is increasing.

    Encryption is the way converting the information to a shape it cannot understandable instead

    of the receiver. Decryption is give back to the encrypted state of the previous significant

    meaningless information with the help of a private key. Encryption and decryption performed

    by Mathematical Functions called cryptography algorithm. Power the encryption method used

    is related to the key length not related to the uncertainties in the algorithm. While encrypted

    data easily opened with the use of key, if the key is unknown, it is impossible the acquisition

    of data in terms of the intensity of mathematical operations.

    There are two types of algorithm; symmetric-key encryption and asymmetric-key encryption.

    4.2.1. Symmetric-key Encryption

    Referred to as single-key encryption or secret-key encryption. A conventional method a single

    key was used in for both encryption and decoding the password.

    4.2.2. Asymmetric-key Encryption

    Asymmetric-key encryption uses a key pair also one of the public key and the other is called

    the private key. This key pair is used for signing the data, encryption and authentication. The

    encryption method distributed the public-key to all although a private key known only by the

    owner. Data encrypted with the public key can be opened only with private key.

    4.3. Antivirus SoftwareThe ideal solution to the threat of viruses is prevention. First, the virus should not be allowed

    to enter the system. Generally not possible to achieve this goal, only reduce the number of

    viral attacks. The next best approach to do the following;

    Finding: The disease comes along; location of the virus is detected and determined. Description: Finding achieved, the diseased virus identified in the program. Destruction: Specific virus is identified, all forms of the virus is eliminated from the

    diseased program or the program is loaded again to the original state.

    All forms of the virus will be discarded from the system to prevent further spreading.

  • 7/30/2019 On-line security: attacks and solutions

    14/17

    13

    EVREN KUCUKKAYA

    Advances in the virus and antivirus technology pass from hand to hand. As well as

    international competition grows about viruses and antivirus software, virus and antivirus

    programs have become complicated.

    4.3.1. Historical Development of Antivirus SoftwareAntivirus software development is divided into four generations;

    First generation: Simple scanners. Second generation: The intuitive / heuristic scanners. Third generation: Active traps, tricks. The fourth generation: A full-featured protection.

    4.3.1.1. First-generation software

    The first generation of virus scanners need virus signature to identify. Carrying certain

    signature scanners has limited functionality in finding known viruses. Another type of first-

    generation software programs that crawl the length of the changes related to the lengths of

    recording this record keeping.

    4.3.1.2. The second-generation software

    The second-generation software, do not trust a particular signature. This type of scanners uses

    intuitive / heuristic rules. Scan the codes which can be viruses. Look at the tendency of

    viruses to encryption, and accordingly find the encryption key. When the key is found, thescanner identifies the virus and avoids deforming.

    Control of the integrity is another approach. Beyond a simple check by using a complex

    function block the virus to produce the same mixed the code again.

    4.3.1.3. Third-generation software

    Third-generation software, memory resident programs that run automatically. They are

    concerned with movements of viruses instead of the programs that are diseased. The

    advantages of these programs do not bother with virus signatures or intuitive rules. Thesekinds of programs they take care small incremental movements and infection attempts to

    interfere with.

    4.3.1.4. The fourth-generation software

    Anti-virus software that belongs to this generation is packages containing different anti-virus

    techniques. This software include screening and active trap components. Moreover, such a

    package, restricting the ability of viruses to enter into a system update for a virus and the

    ability to pass files to disrupt the ability to control include restricting the transition.

  • 7/30/2019 On-line security: attacks and solutions

    15/17

    14

    EVREN KUCUKKAYA

    The fourth-generation software safety measures and the defence area extends more general-

    purpose computer, used an extensive defence strategy.

    4.3.2. Advanced anti-virus techniques

    More complex approaches and antivirus products continue to evolve. In this section, the two

    most important technical examined.

    4.3.2.1. General analysis

    General analysis technology, using a fast scan, to be easily locates even the most complex

    polymorphic viruses. To find such a structure, the current files are passed through the overall

    analysis scan. This scanner includes the following elements.

    CPU emulator, Virus signature scanner, The emulator control module.

    Interpretation of the destination code in the computer and cannot harm the environment.

    Because they are interpreted completely controlled environment.

    4.3.2.2. Digital immune system

    The reason for this system is the increase of Internet-based threats from spreading the virus.

    Achievement of digital immune system depends on the ability to detect of virus analysis

    machine of new virus damages. To avoid the threats of viruses are constantly wandering,

    analysis and control software is constantly updated with the possible digital immune systems.

    4.4. Internet Protocol Security (IPSec)

    IPSec (IP Security) provides a secure way of private networks the communication of the

    Internet environment. IPSec is developed by the IETF (Internet Engineering Task Force) the

    IPSec Working Group. Allow to make strict Authentication and encryption at the network

    layer. Operates communication by using a bi-directional tunnel. Supports asymmetric-key

    data encryption. Supports only IP traffic, and runs as an embedded IP stack.

    5. CONCLUSIONS

    The importance of information security, development and deployment of information and

    communication technologies are rapidly increasing in parallel. Especially the Internet is used

    every aspect of life, although make a powerful communication environment has resulted in

    information security are at stake in. This result, forced persons or institutions to devote more

    resources to ensure the security of information.

  • 7/30/2019 On-line security: attacks and solutions

    16/17

    15

    EVREN KUCUKKAYA

    REFERENCES1. Canbek, G., Klavye Dinleme ve nleme Sistemleri Analiz, Tasarm ve Gelitirme, Yksek Lisans Tezi, Gazi

    niversitesi, Fen Bilimleri Enstits, 13, 31-32, 43, 50, 58, 154, Eyll 2005.

    2. Heiser, J. G., Understanding Todays Malware, Information Security Technical Report. Vol. 9, No. 2, 47 -64,http://www.amazon.com/Understanding-todays-malware-Information-Technical/dp/B000RR1HS0

    3. Calder, A., Watkins, S., It Governance: A Manager's Guide to Data Security & BS 7799/ISO 17799, Kogan Page, 14,163,http://books.google.fr/books?id=0nIFflHd8xsC&printsec=frontcover&hl=tr#v=onepage&q&f=false

    4. Thompson, R., The Four Ages of Malware, Infosecurity Today, 47-48,http://books.google.fr/books?id=vRG7QgAACAAJ&dq=Thompson,+R.,+The+Four+Ages+of+Malware,+Infosecurity+T

    oday,&hl=tr&sa=X&ei=MVd7T4uaJoqi8QOg9oWoCA&ved=0CDUQ6AEwAQ

    5. Grimes, R. A., Malicious Mobile Code, O'Reilly, 3,201-203, 226-228, 238-244, 467-468,http://books.google.fr/books?id=mczgkqHSIXUC&pg=PA81&dq=Grimes,+R.+A.,+Malicious+Mobile+Code,+O'Reilly,&

    hl=tr&sa=X&ei=b1d7T-

    jwB9L_8QO2hOmjCA&ved=0CC4Q6AEwAA#v=onepage&q=Grimes%2C%20R.%20A.%2C%20Malicious%20Mobile%2

    0Code%2C%20O'Reilly%2C&f=false

    6. nternet: Symantec, Symantec Internet Security Threat Report, 2010,http://eval.symantec.com/mktginfo/enterprise/white_papers/b-

    whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdf

    7. Peikari, C., Fogie, S., Maximum Wireless Security, Sams Publishing, 153, 164,8. Skoudis, E., Malware: Fighting Malicious Code, Prentice Hall PTR, 13, 96, 123-125, 149-151, 179,

    http://books.google.fr/books?id=JHgX8_pVPpEC&printsec=frontcover&dq=Skoudis,+E.,+Malware:+Fighting+Malicio

    us+Code,+Prentice+Hall+PTR,&hl=tr&sa=X&ei=9Fh7T9_TLsSt8QOBieHXCA&ved=0CC4Q6AEwAA#v=onepage&q=Sko

    udis%2C%20E.%2C%20Malware%3A%20Fighting%20Malicious%20Code%2C%20Prentice%20Hall%20PTR%2C&f=fals

    e9. nternet: Symantec Security Response - W95.CIH,http://www.symantec.com/avcenter/venc/data/cih. Html10. Gustin, J., Cyber Terrorism, Marcel Dekker, 26-27, http://books.google.fr/books?id=joI-

    gMFbbJMC&pg=PP1&lpg=PP1&dq=Gustin,+J.,+Cyber+Terrorism,+Marcel+Dekker&source=bl&ots=gJ4cnaqMp6&sig

    =xLCZ-4LmYuaQ2ugnQbpEttLa6oY&hl=tr&sa=X&ei=x-J6T5P8HYP_8QOJxcThCA&redir_esc=y#v=onepage&q&f=false

    11. Russell, D., Gangemi, Sr. G.T., Computer Security Basics, O'Reilly, 82,http://books.google.fr/books?id=DyrLV0kZEd8C&printsec=frontcover&dq=Russell,+D.,+Gangemi,+Sr.+G.T.,+Comput

    er+Security+Basics,&hl=tr&sa=X&ei=a-Z6T7ryH8mA8wOkqaidCA&ved=0CDUQ6AEwAA#v=onepage&q&f=false

    12. Thompson, D. P., The Trojan War: Literature and Legends from the Bronze Age to the Present, McFarland &Company, 33,

    http://books.google.fr/books?id=OuuEAAAAIAAJ&q=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends

    +from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&dq=Thompson,+D.+P.,+The+Trojan+War:+Lit

    erature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&hl=tr&sa=X&ei=i-

    x6T5vsCdSC8gO-roHRCA&ved=0CC4Q6AEwAA

    13. nternet: Trojan Programs, VirusList, http://www.viruslist.com/en/virusesdescribed?chapter=15254052114. Hansen, J. B., Young, S., The Hacker's Handbook, CRC Press, 72-74, 126, 530, 714,

    http://books.google.fr/books?id=U9pY5GfzqsIC&pg=PA59&dq=Hansen,+J.+B.,+Young,+S.,+The+Hacker's+Handbook

    ,+CRC+Press,&hl=tr&sa=X&ei=NVp7T6WJBcej8gOByrixCA&ved=0CDcQ6AEwAA#v=onepage&q=Hansen%2C%20J.%2

    0B.%2C%20Young%2C%20S.%2C%20The%20Hacker's%20Handbook%2C%20CRC%20Press%2C&f=false

    15. Conway, R., Cordingley, J., Code Hacking: A Developer's Guide to Network Security, Charles River Media, 55-56,92,

    http://books.google.fr/books?id=nLjvT1OgSZ8C&dq=Conway,+R.,+Cordingley,+J.,+Code+Hacking:+A+Developer's+G

    uide+to+Network+Security,+Charles+River+Media,&hl=tr&sa=X&ei=gFp7T8bQNser8QPI1ZG9CA&ved=0CC4Q6AEwA

    A

    16. Cole, E., Hackers Beware: The Ultimate Guide to Network Security, Sams Publishing, 104-108, 191-193, 544, 550,http://books.google.fr/books?id=fNRuUrhyd4QC&printsec=frontcover&dq=Cole,+E.,+Hackers+Beware:+The+Ultima

    te+Guide+to+Network+Security,+Sams+Publishing,&hl=tr&sa=X&ei=zlp7T76ZLsen8QPA-

    pmYCw&ved=0CDUQ6AEwAQ#v=onepage&q&f=false17. Mohay, G., Collie, B., Vel, O., McKemmish, R., Anderson, A., Computer and Intrusion Forensics, Artech House,

    226,

    http://www.amazon.com/Understanding-todays-malware-Information-Technical/dp/B000RR1HS0http://www.amazon.com/Understanding-todays-malware-Information-Technical/dp/B000RR1HS0http://books.google.fr/books?id=0nIFflHd8xsC&printsec=frontcover&hl=tr#v=onepage&q&f=falsehttp://books.google.fr/books?id=0nIFflHd8xsC&printsec=frontcover&hl=tr#v=onepage&q&f=falsehttp://books.google.fr/books?id=0nIFflHd8xsC&printsec=frontcover&hl=tr#v=onepage&q&f=falsehttp://books.google.fr/books?id=vRG7QgAACAAJ&dq=Thompson,+R.,+The+Four+Ages+of+Malware,+Infosecurity+Today,&hl=tr&sa=X&ei=MVd7T4uaJoqi8QOg9oWoCA&ved=0CDUQ6AEwAQhttp://books.google.fr/books?id=vRG7QgAACAAJ&dq=Thompson,+R.,+The+Four+Ages+of+Malware,+Infosecurity+Today,&hl=tr&sa=X&ei=MVd7T4uaJoqi8QOg9oWoCA&ved=0CDUQ6AEwAQhttp://books.google.fr/books?id=vRG7QgAACAAJ&dq=Thompson,+R.,+The+Four+Ages+of+Malware,+Infosecurity+Today,&hl=tr&sa=X&ei=MVd7T4uaJoqi8QOg9oWoCA&ved=0CDUQ6AEwAQhttp://books.google.fr/books?id=mczgkqHSIXUC&pg=PA81&dq=Grimes,+R.+A.,+Malicious+Mobile+Code,+O%27Reilly,&hl=tr&sa=X&ei=b1d7T-jwB9L_8QO2hOmjCA&ved=0CC4Q6AEwAA#v=onepage&q=Grimes%2C%20R.%20A.%2C%20Malicious%20Mobile%20Code%2C%20O'Reilly%2C&f=falsehttp://books.google.fr/books?id=mczgkqHSIXUC&pg=PA81&dq=Grimes,+R.+A.,+Malicious+Mobile+Code,+O%27Reilly,&hl=tr&sa=X&ei=b1d7T-jwB9L_8QO2hOmjCA&ved=0CC4Q6AEwAA#v=onepage&q=Grimes%2C%20R.%20A.%2C%20Malicious%20Mobile%20Code%2C%20O'Reilly%2C&f=falsehttp://books.google.fr/books?id=mczgkqHSIXUC&pg=PA81&dq=Grimes,+R.+A.,+Malicious+Mobile+Code,+O%27Reilly,&hl=tr&sa=X&ei=b1d7T-jwB9L_8QO2hOmjCA&ved=0CC4Q6AEwAA#v=onepage&q=Grimes%2C%20R.%20A.%2C%20Malicious%20Mobile%20Code%2C%20O'Reilly%2C&f=falsehttp://books.google.fr/books?id=mczgkqHSIXUC&pg=PA81&dq=Grimes,+R.+A.,+Malicious+Mobile+Code,+O%27Reilly,&hl=tr&sa=X&ei=b1d7T-jwB9L_8QO2hOmjCA&ved=0CC4Q6AEwAA#v=onepage&q=Grimes%2C%20R.%20A.%2C%20Malicious%20Mobile%20Code%2C%20O'Reilly%2C&f=falsehttp://books.google.fr/books?id=mczgkqHSIXUC&pg=PA81&dq=Grimes,+R.+A.,+Malicious+Mobile+Code,+O%27Reilly,&hl=tr&sa=X&ei=b1d7T-jwB9L_8QO2hOmjCA&ved=0CC4Q6AEwAA#v=onepage&q=Grimes%2C%20R.%20A.%2C%20Malicious%20Mobile%20Code%2C%20O'Reilly%2C&f=falsehttp://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdfhttp://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdfhttp://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdfhttp://books.google.fr/books?id=JHgX8_pVPpEC&printsec=frontcover&dq=Skoudis,+E.,+Malware:+Fighting+Malicious+Code,+Prentice+Hall+PTR,&hl=tr&sa=X&ei=9Fh7T9_TLsSt8QOBieHXCA&ved=0CC4Q6AEwAA#v=onepage&q=Skoudis%2C%20E.%2C%20Malware%3A%20Fighting%20Malicious%20Code%2C%20Prentice%20Hall%20PTR%2C&f=falsehttp://books.google.fr/books?id=JHgX8_pVPpEC&printsec=frontcover&dq=Skoudis,+E.,+Malware:+Fighting+Malicious+Code,+Prentice+Hall+PTR,&hl=tr&sa=X&ei=9Fh7T9_TLsSt8QOBieHXCA&ved=0CC4Q6AEwAA#v=onepage&q=Skoudis%2C%20E.%2C%20Malware%3A%20Fighting%20Malicious%20Code%2C%20Prentice%20Hall%20PTR%2C&f=falsehttp://books.google.fr/books?id=JHgX8_pVPpEC&printsec=frontcover&dq=Skoudis,+E.,+Malware:+Fighting+Malicious+Code,+Prentice+Hall+PTR,&hl=tr&sa=X&ei=9Fh7T9_TLsSt8QOBieHXCA&ved=0CC4Q6AEwAA#v=onepage&q=Skoudis%2C%20E.%2C%20Malware%3A%20Fighting%20Malicious%20Code%2C%20Prentice%20Hall%20PTR%2C&f=falsehttp://books.google.fr/books?id=JHgX8_pVPpEC&printsec=frontcover&dq=Skoudis,+E.,+Malware:+Fighting+Malicious+Code,+Prentice+Hall+PTR,&hl=tr&sa=X&ei=9Fh7T9_TLsSt8QOBieHXCA&ved=0CC4Q6AEwAA#v=onepage&q=Skoudis%2C%20E.%2C%20Malware%3A%20Fighting%20Malicious%20Code%2C%20Prentice%20Hall%20PTR%2C&f=falsehttp://books.google.fr/books?id=JHgX8_pVPpEC&printsec=frontcover&dq=Skoudis,+E.,+Malware:+Fighting+Malicious+Code,+Prentice+Hall+PTR,&hl=tr&sa=X&ei=9Fh7T9_TLsSt8QOBieHXCA&ved=0CC4Q6AEwAA#v=onepage&q=Skoudis%2C%20E.%2C%20Malware%3A%20Fighting%20Malicious%20Code%2C%20Prentice%20Hall%20PTR%2C&f=falsehttp://www.symantec.com/avcenter/venc/data/cihhttp://www.symantec.com/avcenter/venc/data/cihhttp://www.symantec.com/avcenter/venc/data/cihhttp://books.google.fr/books?id=joI-gMFbbJMC&pg=PP1&lpg=PP1&dq=Gustin,+J.,+Cyber+Terrorism,+Marcel+Dekker&source=bl&ots=gJ4cnaqMp6&sig=xLCZ-4LmYuaQ2ugnQbpEttLa6oY&hl=tr&sa=X&ei=x-J6T5P8HYP_8QOJxcThCA&redir_esc=y#v=onepage&q&f=falsehttp://books.google.fr/books?id=joI-gMFbbJMC&pg=PP1&lpg=PP1&dq=Gustin,+J.,+Cyber+Terrorism,+Marcel+Dekker&source=bl&ots=gJ4cnaqMp6&sig=xLCZ-4LmYuaQ2ugnQbpEttLa6oY&hl=tr&sa=X&ei=x-J6T5P8HYP_8QOJxcThCA&redir_esc=y#v=onepage&q&f=falsehttp://books.google.fr/books?id=joI-gMFbbJMC&pg=PP1&lpg=PP1&dq=Gustin,+J.,+Cyber+Terrorism,+Marcel+Dekker&source=bl&ots=gJ4cnaqMp6&sig=xLCZ-4LmYuaQ2ugnQbpEttLa6oY&hl=tr&sa=X&ei=x-J6T5P8HYP_8QOJxcThCA&redir_esc=y#v=onepage&q&f=falsehttp://books.google.fr/books?id=joI-gMFbbJMC&pg=PP1&lpg=PP1&dq=Gustin,+J.,+Cyber+Terrorism,+Marcel+Dekker&source=bl&ots=gJ4cnaqMp6&sig=xLCZ-4LmYuaQ2ugnQbpEttLa6oY&hl=tr&sa=X&ei=x-J6T5P8HYP_8QOJxcThCA&redir_esc=y#v=onepage&q&f=falsehttp://books.google.fr/books?id=DyrLV0kZEd8C&printsec=frontcover&dq=Russell,+D.,+Gangemi,+Sr.+G.T.,+Computer+Security+Basics,&hl=tr&sa=X&ei=a-Z6T7ryH8mA8wOkqaidCA&ved=0CDUQ6AEwAA#v=onepage&q&f=falsehttp://books.google.fr/books?id=DyrLV0kZEd8C&printsec=frontcover&dq=Russell,+D.,+Gangemi,+Sr.+G.T.,+Computer+Security+Basics,&hl=tr&sa=X&ei=a-Z6T7ryH8mA8wOkqaidCA&ved=0CDUQ6AEwAA#v=onepage&q&f=falsehttp://books.google.fr/books?id=DyrLV0kZEd8C&printsec=frontcover&dq=Russell,+D.,+Gangemi,+Sr.+G.T.,+Computer+Security+Basics,&hl=tr&sa=X&ei=a-Z6T7ryH8mA8wOkqaidCA&ved=0CDUQ6AEwAA#v=onepage&q&f=falsehttp://books.google.fr/books?id=OuuEAAAAIAAJ&q=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&dq=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&hl=tr&sa=X&ei=i-x6T5vsCdSC8gO-roHRCA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=OuuEAAAAIAAJ&q=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&dq=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&hl=tr&sa=X&ei=i-x6T5vsCdSC8gO-roHRCA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=OuuEAAAAIAAJ&q=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&dq=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&hl=tr&sa=X&ei=i-x6T5vsCdSC8gO-roHRCA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=OuuEAAAAIAAJ&q=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&dq=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&hl=tr&sa=X&ei=i-x6T5vsCdSC8gO-roHRCA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=OuuEAAAAIAAJ&q=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&dq=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&hl=tr&sa=X&ei=i-x6T5vsCdSC8gO-roHRCA&ved=0CC4Q6AEwAAhttp://www.viruslist.com/en/virusesdescribed?chapter=152540521http://www.viruslist.com/en/virusesdescribed?chapter=152540521http://www.viruslist.com/en/virusesdescribed?chapter=152540521http://books.google.fr/books?id=U9pY5GfzqsIC&pg=PA59&dq=Hansen,+J.+B.,+Young,+S.,+The+Hacker%27s+Handbook,+CRC+Press,&hl=tr&sa=X&ei=NVp7T6WJBcej8gOByrixCA&ved=0CDcQ6AEwAA#v=onepage&q=Hansen%2C%20J.%20B.%2C%20Young%2C%20S.%2C%20The%20Hacker's%20Handbook%2C%20CRC%20Press%2C&f=falsehttp://books.google.fr/books?id=U9pY5GfzqsIC&pg=PA59&dq=Hansen,+J.+B.,+Young,+S.,+The+Hacker%27s+Handbook,+CRC+Press,&hl=tr&sa=X&ei=NVp7T6WJBcej8gOByrixCA&ved=0CDcQ6AEwAA#v=onepage&q=Hansen%2C%20J.%20B.%2C%20Young%2C%20S.%2C%20The%20Hacker's%20Handbook%2C%20CRC%20Press%2C&f=falsehttp://books.google.fr/books?id=U9pY5GfzqsIC&pg=PA59&dq=Hansen,+J.+B.,+Young,+S.,+The+Hacker%27s+Handbook,+CRC+Press,&hl=tr&sa=X&ei=NVp7T6WJBcej8gOByrixCA&ved=0CDcQ6AEwAA#v=onepage&q=Hansen%2C%20J.%20B.%2C%20Young%2C%20S.%2C%20The%20Hacker's%20Handbook%2C%20CRC%20Press%2C&f=falsehttp://books.google.fr/books?id=U9pY5GfzqsIC&pg=PA59&dq=Hansen,+J.+B.,+Young,+S.,+The+Hacker%27s+Handbook,+CRC+Press,&hl=tr&sa=X&ei=NVp7T6WJBcej8gOByrixCA&ved=0CDcQ6AEwAA#v=onepage&q=Hansen%2C%20J.%20B.%2C%20Young%2C%20S.%2C%20The%20Hacker's%20Handbook%2C%20CRC%20Press%2C&f=falsehttp://books.google.fr/books?id=nLjvT1OgSZ8C&dq=Conway,+R.,+Cordingley,+J.,+Code+Hacking:+A+Developer%27s+Guide+to+Network+Security,+Charles+River+Media,&hl=tr&sa=X&ei=gFp7T8bQNser8QPI1ZG9CA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=nLjvT1OgSZ8C&dq=Conway,+R.,+Cordingley,+J.,+Code+Hacking:+A+Developer%27s+Guide+to+Network+Security,+Charles+River+Media,&hl=tr&sa=X&ei=gFp7T8bQNser8QPI1ZG9CA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=nLjvT1OgSZ8C&dq=Conway,+R.,+Cordingley,+J.,+Code+Hacking:+A+Developer%27s+Guide+to+Network+Security,+Charles+River+Media,&hl=tr&sa=X&ei=gFp7T8bQNser8QPI1ZG9CA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=nLjvT1OgSZ8C&dq=Conway,+R.,+Cordingley,+J.,+Code+Hacking:+A+Developer%27s+Guide+to+Network+Security,+Charles+River+Media,&hl=tr&sa=X&ei=gFp7T8bQNser8QPI1ZG9CA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=fNRuUrhyd4QC&printsec=frontcover&dq=Cole,+E.,+Hackers+Beware:+The+Ultimate+Guide+to+Network+Security,+Sams+Publishing,&hl=tr&sa=X&ei=zlp7T76ZLsen8QPA-pmYCw&ved=0CDUQ6AEwAQ#v=onepage&q&f=falsehttp://books.google.fr/books?id=fNRuUrhyd4QC&printsec=frontcover&dq=Cole,+E.,+Hackers+Beware:+The+Ultimate+Guide+to+Network+Security,+Sams+Publishing,&hl=tr&sa=X&ei=zlp7T76ZLsen8QPA-pmYCw&ved=0CDUQ6AEwAQ#v=onepage&q&f=falsehttp://books.google.fr/books?id=fNRuUrhyd4QC&printsec=frontcover&dq=Cole,+E.,+Hackers+Beware:+The+Ultimate+Guide+to+Network+Security,+Sams+Publishing,&hl=tr&sa=X&ei=zlp7T76ZLsen8QPA-pmYCw&ved=0CDUQ6AEwAQ#v=onepage&q&f=falsehttp://books.google.fr/books?id=fNRuUrhyd4QC&printsec=frontcover&dq=Cole,+E.,+Hackers+Beware:+The+Ultimate+Guide+to+Network+Security,+Sams+Publishing,&hl=tr&sa=X&ei=zlp7T76ZLsen8QPA-pmYCw&ved=0CDUQ6AEwAQ#v=onepage&q&f=falsehttp://books.google.fr/books?id=fNRuUrhyd4QC&printsec=frontcover&dq=Cole,+E.,+Hackers+Beware:+The+Ultimate+Guide+to+Network+Security,+Sams+Publishing,&hl=tr&sa=X&ei=zlp7T76ZLsen8QPA-pmYCw&ved=0CDUQ6AEwAQ#v=onepage&q&f=falsehttp://books.google.fr/books?id=fNRuUrhyd4QC&printsec=frontcover&dq=Cole,+E.,+Hackers+Beware:+The+Ultimate+Guide+to+Network+Security,+Sams+Publishing,&hl=tr&sa=X&ei=zlp7T76ZLsen8QPA-pmYCw&ved=0CDUQ6AEwAQ#v=onepage&q&f=falsehttp://books.google.fr/books?id=fNRuUrhyd4QC&printsec=frontcover&dq=Cole,+E.,+Hackers+Beware:+The+Ultimate+Guide+to+Network+Security,+Sams+Publishing,&hl=tr&sa=X&ei=zlp7T76ZLsen8QPA-pmYCw&ved=0CDUQ6AEwAQ#v=onepage&q&f=falsehttp://books.google.fr/books?id=nLjvT1OgSZ8C&dq=Conway,+R.,+Cordingley,+J.,+Code+Hacking:+A+Developer%27s+Guide+to+Network+Security,+Charles+River+Media,&hl=tr&sa=X&ei=gFp7T8bQNser8QPI1ZG9CA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=nLjvT1OgSZ8C&dq=Conway,+R.,+Cordingley,+J.,+Code+Hacking:+A+Developer%27s+Guide+to+Network+Security,+Charles+River+Media,&hl=tr&sa=X&ei=gFp7T8bQNser8QPI1ZG9CA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=nLjvT1OgSZ8C&dq=Conway,+R.,+Cordingley,+J.,+Code+Hacking:+A+Developer%27s+Guide+to+Network+Security,+Charles+River+Media,&hl=tr&sa=X&ei=gFp7T8bQNser8QPI1ZG9CA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=U9pY5GfzqsIC&pg=PA59&dq=Hansen,+J.+B.,+Young,+S.,+The+Hacker%27s+Handbook,+CRC+Press,&hl=tr&sa=X&ei=NVp7T6WJBcej8gOByrixCA&ved=0CDcQ6AEwAA#v=onepage&q=Hansen%2C%20J.%20B.%2C%20Young%2C%20S.%2C%20The%20Hacker's%20Handbook%2C%20CRC%20Press%2C&f=falsehttp://books.google.fr/books?id=U9pY5GfzqsIC&pg=PA59&dq=Hansen,+J.+B.,+Young,+S.,+The+Hacker%27s+Handbook,+CRC+Press,&hl=tr&sa=X&ei=NVp7T6WJBcej8gOByrixCA&ved=0CDcQ6AEwAA#v=onepage&q=Hansen%2C%20J.%20B.%2C%20Young%2C%20S.%2C%20The%20Hacker's%20Handbook%2C%20CRC%20Press%2C&f=falsehttp://books.google.fr/books?id=U9pY5GfzqsIC&pg=PA59&dq=Hansen,+J.+B.,+Young,+S.,+The+Hacker%27s+Handbook,+CRC+Press,&hl=tr&sa=X&ei=NVp7T6WJBcej8gOByrixCA&ved=0CDcQ6AEwAA#v=onepage&q=Hansen%2C%20J.%20B.%2C%20Young%2C%20S.%2C%20The%20Hacker's%20Handbook%2C%20CRC%20Press%2C&f=falsehttp://www.viruslist.com/en/virusesdescribed?chapter=152540521http://books.google.fr/books?id=OuuEAAAAIAAJ&q=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&dq=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&hl=tr&sa=X&ei=i-x6T5vsCdSC8gO-roHRCA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=OuuEAAAAIAAJ&q=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&dq=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&hl=tr&sa=X&ei=i-x6T5vsCdSC8gO-roHRCA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=OuuEAAAAIAAJ&q=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&dq=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&hl=tr&sa=X&ei=i-x6T5vsCdSC8gO-roHRCA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=OuuEAAAAIAAJ&q=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&dq=Thompson,+D.+P.,+The+Trojan+War:+Literature+and+Legends+from+the+Bronze+Age+to+the+Present,+McFarland+%26+Company&hl=tr&sa=X&ei=i-x6T5vsCdSC8gO-roHRCA&ved=0CC4Q6AEwAAhttp://books.google.fr/books?id=DyrLV0kZEd8C&printsec=frontcover&dq=Russell,+D.,+Gangemi,+Sr.+G.T.,+Computer+Security+Basics,&hl=tr&sa=X&ei=a-Z6T7ryH8mA8wOkqaidCA&ved=0CDUQ6AEwAA#v=onepage&q&f=falsehttp://books.google.fr/books?id=DyrLV0kZEd8C&printsec=frontcover&dq=Russell,+D.,+Gangemi,+Sr.+G.T.,+Computer+Security+Basics,&hl=tr&sa=X&ei=a-Z6T7ryH8mA8wOkqaidCA&ved=0CDUQ6AEwAA#v=onepage&q&f=falsehttp://books.google.fr/books?id=joI-gMFbbJMC&pg=PP1&lpg=PP1&dq=Gustin,+J.,+Cyber+Terrorism,+Marcel+Dekker&source=bl&ots=gJ4cnaqMp6&sig=xLCZ-4LmYuaQ2ugnQbpEttLa6oY&hl=tr&sa=X&ei=x-J6T5P8HYP_8QOJxcThCA&redir_esc=y#v=onepage&q&f=falsehttp://books.google.fr/books?id=joI-gMFbbJMC&pg=PP1&lpg=PP1&dq=Gustin,+J.,+Cyber+Terrorism,+Marcel+Dekker&source=bl&ots=gJ4cnaqMp6&sig=xLCZ-4LmYuaQ2ugnQbpEttLa6oY&hl=tr&sa=X&ei=x-J6T5P8HYP_8QOJxcThCA&redir_esc=y#v=onepage&q&f=falsehttp://books.google.fr/books?id=joI-gMFbbJMC&pg=PP1&lpg=PP1&dq=Gustin,+J.,+Cyber+Terrorism,+Marcel+Dekker&source=bl&ots=gJ4cnaqMp6&sig=xLCZ-4LmYuaQ2ugnQbpEttLa6oY&hl=tr&sa=X&ei=x-J6T5P8HYP_8QOJxcThCA&redir_esc=y#v=onepage&q&f=falsehttp://www.symantec.com/avcenter/venc/data/cihhttp://books.google.fr/books?id=JHgX8_pVPpEC&printsec=frontcover&dq=Skoudis,+E.,+Malware:+Fighting+Malicious+Code,+Prentice+Hall+PTR,&hl=tr&sa=X&ei=9Fh7T9_TLsSt8QOBieHXCA&ved=0CC4Q6AEwAA#v=onepage&q=Skoudis%2C%20E.%2C%20Malware%3A%20Fighting%20Malicious%20Code%2C%20Prentice%20Hall%20PTR%2C&f=falsehttp://books.google.fr/books?id=JHgX8_pVPpEC&printsec=frontcover&dq=Skoudis,+E.,+Malware:+Fighting+Malicious+Code,+Prentice+Hall+PTR,&hl=tr&sa=X&ei=9Fh7T9_TLsSt8QOBieHXCA&ved=0CC4Q6AEwAA#v=onepage&q=Skoudis%2C%20E.%2C%20Malware%3A%20Fighting%20Malicious%20Code%2C%20Prentice%20Hall%20PTR%2C&f=falsehttp://books.google.fr/books?id=JHgX8_pVPpEC&printsec=frontcover&dq=Skoudis,+E.,+Malware:+Fighting+Malicious+Code,+Prentice+Hall+PTR,&hl=tr&sa=X&ei=9Fh7T9_TLsSt8QOBieHXCA&ved=0CC4Q6AEwAA#v=onepage&q=Skoudis%2C%20E.%2C%20Malware%3A%20Fighting%20Malicious%20Code%2C%20Prentice%20Hall%20PTR%2C&f=falsehttp://books.google.fr/books?id=JHgX8_pVPpEC&printsec=frontcover&dq=Skoudis,+E.,+Malware:+Fighting+Malicious+Code,+Prentice+Hall+PTR,&hl=tr&sa=X&ei=9Fh7T9_TLsSt8QOBieHXCA&ved=0CC4Q6AEwAA#v=onepage&q=Skoudis%2C%20E.%2C%20Malware%3A%20Fighting%20Malicious%20Code%2C%20Prentice%20Hall%20PTR%2C&f=falsehttp://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdfhttp://eval.symantec.com/mktginfo/enterprise/white_papers/b-whitepaper_internet_security_threat_report_xv_04-2010.en-us.pdfhttp://books.google.fr/books?id=mczgkqHSIXUC&pg=PA81&dq=Grimes,+R.+A.,+Malicious+Mobile+Code,+O%27Reilly,&hl=tr&sa=X&ei=b1d7T-jwB9L_8QO2hOmjCA&ved=0CC4Q6AEwAA#v=onepage&q=Grimes%2C%20R.%20A.%2C%20Malicious%20Mobile%20Code%2C%20O'Reilly%2C&f=falsehttp://books.google.fr/books?id=mczgkqHSIXUC&pg=PA81&dq=Grimes,+R.+A.,+Malicious+Mobile+Code,+O%27Reilly,&hl=tr&sa=X&ei=b1d7T-jwB9L_8QO2hOmjCA&ved=0CC4Q6AEwAA#v=onepage&q=Grimes%2C%20R.%20A.%2C%20Malicious%20Mobile%20Code%2C%20O'Reilly%2C&f=falsehttp://books.google.fr/books?id=mczgkqHSIXUC&pg=PA81&dq=Grimes,+R.+A.,+Malicious+Mobile+Code,+O%27Reilly,&hl=tr&sa=X&ei=b1d7T-jwB9L_8QO2hOmjCA&ved=0CC4Q6AEwAA#v=onepage&q=Grimes%2C%20R.%20A.%2C%20Malicious%20Mobile%20Code%2C%20O'Reilly%2C&f=falsehttp://books.google.fr/books?id=mczgkqHSIXUC&pg=PA81&dq=Grimes,+R.+A.,+Malicious+Mobile+Code,+O%27Reilly,&hl=tr&sa=X&ei=b1d7T-jwB9L_8QO2hOmjCA&ved=0CC4Q6AEwAA#v=onepage&q=Grimes%2C%20R.%20A.%2C%20Malicious%20Mobile%20Code%2C%20O'Reilly%2C&f=falsehttp://books.google.fr/books?id=vRG7QgAACAAJ&dq=Thompson,+R.,+The+Four+Ages+of+Malware,+Infosecurity+Today,&hl=tr&sa=X&ei=MVd7T4uaJoqi8QOg9oWoCA&ved=0CDUQ6AEwAQhttp://books.google.fr/books?id=vRG7QgAACAAJ&dq=Thompson,+R.,+The+Four+Ages+of+Malware,+Infosecurity+Today,&hl=tr&sa=X&ei=MVd7T4uaJoqi8QOg9oWoCA&ved=0CDUQ6AEwAQhttp://books.google.fr/books?id=0nIFflHd8xsC&printsec=frontcover&hl=tr#v=onepage&q&f=falsehttp://www.amazon.com/Understanding-todays-malware-Information-Technical/dp/B000RR1HS0
  • 7/30/2019 On-line security: attacks and solutions

    17/17

    16

    EVREN KUCUKKAYA

    http://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R

    .,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA&

    ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKe

    mmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech

    %20House%2C&f=false

    18. Caloyannides, M. A., Privacy Protection and Computer Forensics, Artech House, 118-120,19. Russell, R., Hack Proofing Your Network, Syngress Publishing, 78,

    http://books.google.fr/books?id=flaI_VVftE0C&printsec=frontcover&hl=tr#v=onepage&q&f=false

    20. Hausman, K. K., Barrett, D., Weiss, M., Exam Cram 2 Security +: Exam Cram SYO-101, Que Publishing, 59,21. Mandia, K., Prosise, C., Incident Response Second Edition: Computer Forensics, McGraw- Hill Professional, 389-

    390,

    22. nternet: Binder, SearchWin2000, TechTarget.http://searchwin2000.techtarget.com/sDefinition/0,sid1_gci948478,00.html

    23. Poole, O., Network Security: A Practical Guide, Elsevier, 69-71,24. Pipkin, D. L., Halting the Hacker - A Practical Guide to Computer Security, Prentice Hall PTR, 52,

    http://books.google.fr/books?id=M6sfthR8huQC&printsec=frontcover&dq=Pipkin,+D.+L.,+Halting+the+Hacker+-

    +A+Practical+Guide+to+Computer+Security,+Prentice+Hall+PTR&hl=tr&sa=X&ei=tFx7T7LjIs-

    38QObxbHQCA&ved=0CCwQ6AEwAA#v=onepage&q&f=false

    25. Bennett, J., Digital Umbrella: Technology's Attack on Personal Privacy in America, Brown Walker Press (FL), 47-50

    http://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R.,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA&ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKemmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech%20House%2C&f=falsehttp://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R.,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA&ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKemmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech%20House%2C&f=falsehttp://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R.,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA&ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKemmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech%20House%2C&f=falsehttp://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R.,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA&ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKemmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech%20House%2C&f=falsehttp://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R.,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA&ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKemmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech%20House%2C&f=falsehttp://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R.,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA&ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKemmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech%20House%2C&f=falsehttp://books.google.fr/books?id=flaI_VVftE0C&printsec=frontcover&hl=tr#v=onepage&q&f=falsehttp://books.google.fr/books?id=flaI_VVftE0C&printsec=frontcover&hl=tr#v=onepage&q&f=falsehttp://searchwin2000.techtarget.com/sDefinition/0,sid1_gci948478,00.htmlhttp://searchwin2000.techtarget.com/sDefinition/0,sid1_gci948478,00.htmlhttp://books.google.fr/books?id=M6sfthR8huQC&printsec=frontcover&dq=Pipkin,+D.+L.,+Halting+the+Hacker+-+A+Practical+Guide+to+Computer+Security,+Prentice+Hall+PTR&hl=tr&sa=X&ei=tFx7T7LjIs-38QObxbHQCA&ved=0CCwQ6AEwAA#v=onepage&q&f=falsehttp://books.google.fr/books?id=M6sfthR8huQC&printsec=frontcover&dq=Pipkin,+D.+L.,+Halting+the+Hacker+-+A+Practical+Guide+to+Computer+Security,+Prentice+Hall+PTR&hl=tr&sa=X&ei=tFx7T7LjIs-38QObxbHQCA&ved=0CCwQ6AEwAA#v=onepage&q&f=falsehttp://books.google.fr/books?id=M6sfthR8huQC&printsec=frontcover&dq=Pipkin,+D.+L.,+Halting+the+Hacker+-+A+Practical+Guide+to+Computer+Security,+Prentice+Hall+PTR&hl=tr&sa=X&ei=tFx7T7LjIs-38QObxbHQCA&ved=0CCwQ6AEwAA#v=onepage&q&f=falsehttp://books.google.fr/books?id=M6sfthR8huQC&printsec=frontcover&dq=Pipkin,+D.+L.,+Halting+the+Hacker+-+A+Practical+Guide+to+Computer+Security,+Prentice+Hall+PTR&hl=tr&sa=X&ei=tFx7T7LjIs-38QObxbHQCA&ved=0CCwQ6AEwAA#v=onepage&q&f=falsehttp://books.google.fr/books?id=M6sfthR8huQC&printsec=frontcover&dq=Pipkin,+D.+L.,+Halting+the+Hacker+-+A+Practical+Guide+to+Computer+Security,+Prentice+Hall+PTR&hl=tr&sa=X&ei=tFx7T7LjIs-38QObxbHQCA&ved=0CCwQ6AEwAA#v=onepage&q&f=falsehttp://books.google.fr/books?id=M6sfthR8huQC&printsec=frontcover&dq=Pipkin,+D.+L.,+Halting+the+Hacker+-+A+Practical+Guide+to+Computer+Security,+Prentice+Hall+PTR&hl=tr&sa=X&ei=tFx7T7LjIs-38QObxbHQCA&ved=0CCwQ6AEwAA#v=onepage&q&f=falsehttp://books.google.fr/books?id=M6sfthR8huQC&printsec=frontcover&dq=Pipkin,+D.+L.,+Halting+the+Hacker+-+A+Practical+Guide+to+Computer+Security,+Prentice+Hall+PTR&hl=tr&sa=X&ei=tFx7T7LjIs-38QObxbHQCA&ved=0CCwQ6AEwAA#v=onepage&q&f=falsehttp://searchwin2000.techtarget.com/sDefinition/0,sid1_gci948478,00.htmlhttp://books.google.fr/books?id=flaI_VVftE0C&printsec=frontcover&hl=tr#v=onepage&q&f=falsehttp://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R.,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA&ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKemmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech%20House%2C&f=falsehttp://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R.,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA&ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKemmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech%20House%2C&f=falsehttp://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R.,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA&ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKemmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech%20House%2C&f=falsehttp://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R.,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA&ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKemmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech%20House%2C&f=falsehttp://books.google.fr/books?id=KRwXEHTK3OwC&pg=PA122&dq=Mohay,+G.,+Collie,+B.,+Vel,+O.,+McKemmish,+R.,+Anderson,+A.,+Computer+and+Intrusion+Forensics,+Artech+House,&hl=tr&sa=X&ei=FFt7T8_DLs_f8QPxuKmfCA&ved=0CC4Q6AEwAA#v=onepage&q=Mohay%2C%20G.%2C%20Collie%2C%20B.%2C%20Vel%2C%20O.%2C%20McKemmish%2C%20R.%2C%20Anderson%2C%20A.%2C%20Computer%20and%20Intrusion%20Forensics%2C%20Artech%20House%2C&f=false