首页> 外文期刊>Journal of Information Warfare >Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques
【24h】

Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques

机译:使用欺骗来隐藏黑客的东西:流程,原则和技术

获取原文
获取原文并翻译 | 示例
       

摘要

Deception offers one means of hiding things from an adversary. This paper introduces a model for understanding, comparing, and developing methods of deceptive hiding. The model characterizes deceptive hiding in terms of how it defeats the underlying processes that an adversary uses to discover the hidden thing. An adversary's process of discovery can take three forms: direct observation (sensing and recognizing), investigation (evidence collection and hypothesis formation), and learning from other people or agents. Deceptive hiding works by defeating one or more elements of these processes. The model is applied to computer security, and it is also applicable to other domains.
机译:欺骗提供了一种躲避对手的一种手段。 本文介绍了一种理解,比较和开发欺骗性隐藏方法的模型。 该模型的特征在于欺骗性隐藏在击败对手的潜在流程方面,使对手用来发现隐藏的东西。 对手的发现过程可以采取三种形式:直接观察(传感和识别),调查(证据收集和假设形成),并从其他人或代理商学习。 通过击败这些过程的一个或多个元素来欺骗隐藏工程。 该模型应用于计算机安全性,并且它也适用于其他域。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号