Attacking Confidentiality: An Agent Based Approach

  • Kapil Kumar Gupta
  • Baikunth Nath
  • Kotagiri Ramamohanarao
  • Ashraf U. Kazi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3975)


A network is not secure unless it can ensure the three basic security concepts; confidentiality, integrity and availability. Attack on confidentiality and integrity of data are emerging trends in network intrusion. In this paper we primarily focus on the confidentiality aspect. With more and more sophisticated tools being easily available the number of security incidents has been rapidly increasing. Such tools reduce the attack preparation time thereby increasing attack frequency. The use of such tools also makes it difficult to discover attacks at an early stage before substantial damage has been done. Here we show a highly personalized attack by the use of specialized agents whose purpose is to search and transmit specific information from a private network without authorized access. This information may be in the form of a competitor’s marketing strategy, customers’ personal details, true financial status of an organization or any other information. We discuss that such an agent and its activity is different from common malware, describe its characteristics and design and show that such a scenario is a real possibility. We also discuss the related issues and the alarming effects posed by such an agent. It is possible that the agent we are discussing may already be in existence but are unreported.


Intrusion Detection System Personalized Attack Malicious Code Target Network Agent Base System 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Cert advisory ca-2001-22 w32/sircam malicious code, august (2001),
  2. 2.
    Computer worm. Wikipedia, the free encyclopedia,
  3. 3.
    Overview of attack trends (2002),
  4. 4.
    Social engineering. Wikipedia, the free encyclopedia,
  5. 5.
    Software agent. Wikipedia, the free encyclopedia,
  6. 6.
    Spyware. Wikipedia, the free encyclopedia,
  7. 7.
    Report on Privacy and Security, The Federal Trade Commission Advisory Committee on Online Access and Security (May 2000)Google Scholar
  8. 8.
    The G8 Internet Security Conference, Paris, France (May 2000)Google Scholar
  9. 9.
    Oracle http server vulnerability (2005),
  10. 10.
    Adler, M.: Cyberspace, General Searches and Digial Conraband: the Fourth Amendment and the Net-Wite Search. Yale Law Journal 105, 1093–1120 (1996)CrossRefGoogle Scholar
  11. 11.
    Agarwal, R., Kiernan, J., Srikant, R., Xu, Y.: Hippocratic databases. In: Proceedings of the 28th International Conference on Very Large Databases (2002)Google Scholar
  12. 12.
    Allen, J., Christie, A., Fithen, W., McHugh, J., Pickel, J., Stoner, E.: State of practice of intrusion detection technologies. Technical Report CMU/SEI-99-TR-028 ESC-99-028 (1999),
  13. 13.
    Ames, W.: Understanding spyware: risk and response. IT Professional 6(5), 25–29 (2004)CrossRefMathSciNetGoogle Scholar
  14. 14.
    Bace, R., Mell, P.: Intrusion Detection Systems. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (2001)Google Scholar
  15. 15.
    Bronitt, S.: Complementary Comment: electronic Surveillance and Informers: Infringing the Right to Silence and Privacy. Criminal Law Journal 20, 144–152 (1996)Google Scholar
  16. 16.
    Bronitt, S.: Electronic Surveillance, Human Rights and Criminal Justice. Australian Journal of Human Rights 3, 183–207 (1997)Google Scholar
  17. 17.
    Carroll, M., Schrader, R.: Computer Related Crimes (Tenth Survey of White Collar Crime). American Criminal Law Review 32(2), 185–211 (1995)Google Scholar
  18. 18.
    Castano, S., Fugini, M., Martella, G., Samarati, P.: Database Security. Addison Wesley, Reading (1994)Google Scholar
  19. 19.
    Crocker, S.D.: Protecting the internet from distributed denial-of-service attacks: a proposal. In: Proceedings of the IEEE, September 2004, vol. 92(9) (2004)Google Scholar
  20. 20.
    Dearing, M.C.: Personal Jurisdiction and the Internet: Can the Traditional Principles and Landmark Cases Guide the Legal System Into the 21st Centuary? Journal of Technology, Law and Policy 4(1) (1999)Google Scholar
  21. 21.
  22. 22.
    Hackworth, A.: Spyware. CERT Coordination Center Report (2005),
  23. 23.
    Hochberg, L.: E-Avesdropping. Online News (January 2000),
  24. 24.
    Longstaff, T.A., Ellis, J.T., Hernan, S.V., Lipson, H.F., Mcmillan, R.D., Pesante, L.H., Simmel, D.: Security of the internet. The Froehlich/Kent Encyclopedia of Telecommunications, Marcel Dekker, New York. CERT Coordination Center Report, vol. 15, pp. 231–255 (1997),
  25. 25.
    Marlowe, B.: You are Being Watched. ZDNet Magazine (December 1999)Google Scholar
  26. 26.
    Murch, Johnson: Intelligent software agents (1999)Google Scholar
  27. 27.
    Nwana, H.S.: Software agents: An overview,
  28. 28.
    Paulson, L.D.: Spike in phishing and malware a danger to it. IT Professional 7(3) (May/June 2005)Google Scholar
  29. 29.
    Shannon, C., Moore, D.: The spread of the witty worm. CAIDA analysis for the spread of Witty worm,
  30. 30.
    Sommers, J., Yegneswaran, V., Barford, P.: A framework for malicious workload generation. In: Internet Measurement Conference, Taormina, Sicily, Italy, October 25 - 27 (2004),
  31. 31.
    Spafford, E.: The internet worm program: An analysis. Technical Report CSD-TR-823, Purdue University (November 1988)Google Scholar
  32. 32.
    Staniford, S., Paxson, V., Weaver, N.: How to own the internet in your spare time. In: 11th Usenix Security Symposium, San Francisco (August 2002)Google Scholar
  33. 33.
    Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of internet worms,

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Kapil Kumar Gupta
    • 1
  • Baikunth Nath
    • 1
  • Kotagiri Ramamohanarao
    • 1
  • Ashraf U. Kazi
    • 2
  1. 1.Department of Computer Science and Software Engineering National ICT AustraliaThe University of Melbourne 
  2. 2.Department of Business Law and TaxationMonash University 

Personalised recommendations