首页> 外文学位 >Performance analysis of cyber deception using probabilistic models
【24h】

Performance analysis of cyber deception using probabilistic models

机译:使用概率模型的网络欺骗性能分析

获取原文
获取原文并翻译 | 示例

摘要

With the recent development of cyber-crime and cyber-warefare, new techniques for thwarting cyber attackers are required. Deception is the a mechanism that at- tempts to distort or misled an adversary. It is a proven tactic leveraged in traditional warfare with a long history of noted successes. While deception has seen great success in traditional warfare, it has seen little use within the cyber security realm. Further- more, there is very little demonstrated modeling of such defenses in terms of attackers success. This thesis establishes a novel urn-modeling technique for providing the probability of success for an attacker in two different network deception defenses, network address shuffling and honeypots. This work goes on to analyze these models in two scenarios, gaining a foothold and minimum to win, providing insight into the effect both defenses can have under various environments. Finally, this thesis performs an empirical analysis of network address shuffling to provide a cost-benefit analysis regarding attack success and the effect on legitimate network users.
机译:随着网络犯罪和网络商品的最新发展,需要用于阻止网络攻击者的新技术。欺骗是企图扭曲或误导对手的一种机制。这是在传统战争中运用的久经考验的战术,已有悠久的成功历史。尽管欺骗在传统战争中取得了巨大成功,但在网络安全领域却很少使用。此外,就攻击者的成功而言,很少有经过证明的此类防御模型。本文建立了一种新颖的骨灰盒建模技术,为攻击者提供了两种不同的网络欺骗防御,网络地址改组和蜜罐攻击的成功概率。这项工作将继续在两种情况下分析这些模型,以立足点并赢得最少的机会,从而深入了解两种防御在各种环境下可能产生的影响。最后,本文对网络地址改组进行了实证分析,以提供关于攻击成功和对合法网络用户的影响的成本效益分析。

著录项

  • 作者

    Crouse, Michael B.;

  • 作者单位

    Wake Forest University.;

  • 授予单位 Wake Forest University.;
  • 学科 Computer science.
  • 学位 M.S.
  • 年度 2012
  • 页码 77 p.
  • 总页数 77
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号