首页> 外文会议>International Computer Software and Applications Conference, Annual >On the response policy to software decoys: conducting software-based deception in the cyber battlespace
【24h】

On the response policy to software decoys: conducting software-based deception in the cyber battlespace

机译:关于软件诱饵的响应政策:在网络战斗空间中进行基于软件的欺骗

获取原文

摘要

Intelligent software decoys employ deception techniques to maintain the interaction between themselves and calling processes or threads that violate the contracts of the software components that the decoys defend. The software decoy's goal is to learn about the nature of such interactions before either terminating the interaction or treating the calling process or thread as a cyber combatant. Software components can be wrapped at any level of ion, from web applets to operating system calls. It is foreseeable that the decoying actions, termination of interaction, or counterattack by the decoy could in some way violate the law of armed conflict. In this paper we examine the response policy of software decoys in terms of discrimination, necessity, proportionality, and chivalry on the cyber battlefield.
机译:智能软件诱饵采用欺骗技术,以维持自己与调用诱惑诱饵捍卫的软件组件合同的流程或线程之间的互动。软件诱饵的目标是了解在终止交互或将呼叫过程或线程视为网络战区之前的这种相互作用的性质。软件组件可以在任何级别的ION级别包装到操作系统调用。可以以某种方式违反武装冲突的欺诈行为,终止互动或反击可能会丧失武装冲突。在本文中,我们在网络战场上的歧视,必要性,比例和侠义方面审查软件诱饵的响应政策。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号