|
This article is cited in 1 scientific paper (total in 1 paper)
Hidden impact without malicious code
A. A. Grushoa, N. A. Grushoa, M. I. Zabezhailob, E. E. Timoninaa a Institute of Informatics Problems, Federal Research Center "Computer Sciences and Control" of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119133, Russian Federation
b A. A. Dorodnicyn Computing Center, Federal Research Center "Computer Science and Control" of Russian Academy of Sciences, 40 Vavilov Str., Moscow 119333, Russian Federation
Abstract:
The paper reflects a number of problems related to threats to distributed information systems due to the presence of BackDoor. The usage of BackDoor to attack distributed computer systems has great advantages over the traditional usage of malicious code. In fact, the usage of BackDoor is difficult to identify as a special attack, i. e., distinguish from error in computing processes. However, building attacks with BackDoor is much more difficult than building attacks with malicious code. The example of BackDoor is built using the initial data of information technology. This approach to the construction of BackDoor was not found in any of the descriptions of BackDoor. The paper shows that the existing technologies for finding vulnerabilities in the hardware and software of the system do not solve the problems of searching for BackDoor. Mathematical models and methods for solving BackDoor search problems, except in particular cases, have not yet been developed. It is important that BackDoor is not associated with the introduction of malicious code into the computer system and with the usage of malicious code to cause damage. Therefore, as a rule, the mechanism of causing damage through BackDoor differs from the action of malicious code.
Keywords:
information security, BackDoor, BackDoor through data.
Received: 15.03.2021
Citation:
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina, “Hidden impact without malicious code”, Sistemy i Sredstva Inform., 31:2 (2021), 4–15
Linking options:
https://www.mathnet.ru/eng/ssi760 https://www.mathnet.ru/eng/ssi/v31/i2/p4
|
|