Journal: International Journal Of Computer Applications (IJCA)
ISSN Number:
0
Downloads
15
Views
Abstract
Hackers have devised a recent technique of infiltrating critical infrastructure with wanton applications that gulp at the limited resources possessed by these infrastructure for meeting critical needs and deadlines. Also a reality is the fact that hackers could breach already existing and trusted applications or software on these critical infrastructure and bug them with malicious codes that plunge them into a state of wantonness; consuming limited, critical resources and making none (or insufficient) available for other, equally critical applications that depend on a fair portion of the same resources to meet their deadlines and critical requirements. This development portends the next generation of denial of service (DoS) and distributed denial of service (DDoS) attacks to critical infrastructure, where all that is required is to discover vulnerabilities in already trusted and running applications on critical infrastructure or deliver and escalate new applications on these critical infrastructure and plunge them into wantonness, consuming limited resources and resulting in a denial of service. Proposals already exist in literature that could forestall an occurrence of such attacks, but some of these have not previously been tested; one of such being that documented by (Ogu, Idowu, & Adesegun, 2015). This research is an experimental implementation of the theoretical model proposed in the cited article, in order to test and validate its workability and results. An experimental prototype – codenamed “ResMon” – of the model proposed is built and validated within the Ubuntu Linux operating system environment.
OGU,E. Jean-paul,A. IDOWU,S. Ogu,C. .
(2016). ResMon: Securing Resource Consumption of Critical Infrastructure from Wanton Applications, 137
(), 15-15.
OGU,E. Jean-paul,A. IDOWU,S. Ogu,C. .
"ResMon: Securing Resource Consumption of Critical Infrastructure from Wanton Applications" 137, no (), (2016):
15-15.
OGU,E. and Jean-paul,A. and IDOWU,S. and Ogu,C. and .
(2016). ResMon: Securing Resource Consumption of Critical Infrastructure from Wanton Applications, 137
(), pp15-15.
OGUE, Jean-paulA, IDOWUS, OguC, .
ResMon: Securing Resource Consumption of Critical Infrastructure from Wanton Applications. 2016, 137
():15-15.
OGU,Emmanuel ,
Jean-paul,Ainam ,
IDOWU,Sunday ,
and Ogu,Chiemela
.
"ResMon: Securing Resource Consumption of Critical Infrastructure from Wanton Applications", 137 . (2016) :
15-15.
[1]
O.Emmanuel J.Ainam I.Sunday & O.Chiemela ,
"ResMon: Securing Resource Consumption of Critical Infrastructure from Wanton Applications"
vol.137,
no.,
pp. 15-15,
2016.