首页> 外文会议> >On the response policy of software decoys: Conducting software-based deception in the cyber battlespace
【24h】

On the response policy of software decoys: Conducting software-based deception in the cyber battlespace

机译:关于软件诱饵的响应策略:在网络战场中进行基于软件的欺骗

获取原文

摘要

Intelligent software decoys employ deception techniques to maintain the interaction between themselves and calling processes or threads that violate the contracts of the software components that the decoys defend. The software decoy's goal is to learn about the nature of such interactions before either terminating the interaction or treating the calling process or thread as a cyber combatant. Software components can be wrapped at any level of abstraction, from web applets to operating system calls. It is foreseeable that the decoying actions, termination of interaction, or counterattack by the decoy could in some way violate the law of armed conflict. In this paper we examine the response policy of software decoys in terms of discrimination, necessity, proportionality, and chivalry on the cyber battlefield.
机译:智能软件诱饵使用欺骗技术来维持自身与违反诱饵捍卫的软件组件合同的调用进程或线程之间的交互。软件诱饵的目标是在终止交互或将调用过程或线程视为网络战斗员之前,了解此类交互的性质。从Web小程序到操作系统调用,软件组件可以以任何抽象级别进行包装。可以预见,诱饵的诱骗行动,相互作用的终止或反击可能在某种程度上违反武装冲突法。在本文中,我们从网络战场上的歧视性,必要性,比例性和骑士性方面研究了软件诱饵的响应策略。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号