首页> 外文OA文献 >Bait and Snitch: Defending Computer Systems with Decoys
【2h】

Bait and Snitch: Defending Computer Systems with Decoys

机译:诱饵和告密者:用诱饵防御计算机系统

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。
获取外文期刊封面目录资料

摘要

Threats against computer networks continue to multiply, but existing security solutions are persistently unable to keep pace with these challenges. In this paper we present a new paradigm for securing computational resources which we call decoy technology. This technique involves seeding a system with data that appears authentic but is in fact spurious. Attacks can then be detected by monitoring this phony information for access events. Decoys are capable of detecting malicious activity, such as insider and masquerade attacks, that are beyond the scope of traditional security measures. They can be used to address confidentiality breaches either proactively or after they have taken place. This work examines the challenges that must be overcome in order to successfully deploy decoys as part of a comprehensive security solution. It discusses situations where decoys are particularly useful as well as characteristics that effective decoy material should share. Furthermore, we describe the tools that we have developed to efficiently craft and distribute decoys in order to form a network of sensors that is capable of detecting adversarial action that occurs anywhere in an organizations system.
机译:对计算机网络的威胁不断增加,但是现有的安全解决方案始终无法跟上这些挑战。在本文中,我们提出了一种保护计算资源的新范例,我们将其称为诱饵技术。该技术涉及使用看起来真实但实际上是虚假的数据为系统播种。然后可以通过监视此假信息以了解访问事件来检测攻击。诱饵能够检测到超出传统安全措施范围之内的恶意活动,例如内部人员和化装舞会。它们可以用于主动或在发生机密性违规行为后加以解决。这项工作研究了成功部署诱饵作为全面安全解决方案的一部分必须克服的挑战。它讨论了诱饵特别有用的情况以及有效诱饵材料应具有的特征。此外,我们描述了为有效制作和分发诱饵而开发的工具,以形成能够检测组织系统中任何地方发生的对抗行为的传感器网络。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号