International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 137 - Number 7 |
Year of Publication: 2016 |
Authors: Emmanuel C. Ogu, Sunday A. Idowu, Jean-Paul Ainam, Ogu Chiemela |
10.5120/ijca2016908814 |
Emmanuel C. Ogu, Sunday A. Idowu, Jean-Paul Ainam, Ogu Chiemela . ResMon: Securing Resource Consumption of Critical Infrastructure from Wanton Applications. International Journal of Computer Applications. 137, 7 ( March 2016), 15-22. DOI=10.5120/ijca2016908814
Hackers have devised a recent technique of infiltrating critical infrastructure with wanton applications that gulp at the limited resources possessed by these infrastructure for meeting critical needs and deadlines. Also a reality is the fact that hackers could breach already existing and trusted applications or software on these critical infrastructure and bug them with malicious codes that plunge them into a state of wantonness; consuming limited, critical resources and making none (or insufficient) available for other, equally critical applications that depend on a fair portion of the same resources to meet their deadlines and critical requirements. This development portends the next generation of denial of service (DoS) and distributed denial of service (DDoS) attacks to critical infrastructure, where all that is required is to discover vulnerabilities in already trusted and running applications on critical infrastructure or deliver and escalate new applications on these critical infrastructure and plunge them into wantonness, consuming limited resources and resulting in a denial of service. Proposals already exist in literature that could forestall an occurrence of such attacks, but some of these have not previously been tested; one of such being that documented by [1]. This research is an experimental implementation of the theoretical model proposed in the cited article, in order to test and validate its workability and results. An experimental prototype – codenamed “ResMon” – of the model proposed is built and validated within the Ubuntu Linux operating system environment.