Context-Aware Knowledge System and Methods for Deploying Deception Mechanisms

作者: Nirmesh Neema , Venkata Babji Sama , Suril Desai , Satnam Singh , Rajendra Gopalakrishna

DOI:

关键词: Mechanism (biology)Knowledge-based systemsDeceptionComputer securityContext (language use)Asset (computer security)Computer science

摘要: Methods, systems, and computer-readable mediums are described herein to provide context-aware knowledge systems methods for deploying deception mechanisms. In some examples, a profiler can be used intelligently deploy the mechanisms network. For example, method include identifying network which one or more such an mechanism emulate characteristics of machine on The further determining asset densities summary statistic. An density associated with number assets connected statistic historical attacks Using at least densities, statistic, other information network, combination thereof, deploy,

参考文章(18)
Dmitri Alperovitch, George Robert Kurtz, David F. Diehl, Adam S. Meyers, Sven Krasser, Deception-based responses to security attacks ,(2014)
Greg Hannis, Francisco Guerrra, Dennis Nadeau, System and method for computer security ,(2013)
Peter Gutman, Martin Guillaume, Geoff Campbell, System, method, apparatus and means for protecting digital content ,(2002)
Craig A. Schultz, Yadong Zhang, Johnson L. Wu, Eric Winsborrow, Steven M. Silva, Network infrastructure obfuscation ,(2013)
Venkatesh Krishnaswamy, John F. Buford, System and method for voip honeypot for converged voip services ,(2010)
Ronald O'Neal Edmark, John Michael Garrison, Vikki Kim Converse, Kenneth W. Blake, Method and system for morphing honeypot ,(2002)
Jeffrey Earl Bickford, Qi Shen, Andrea G. Forte, Wei Wang, Multilayered deception for intrusion detection and prevention ,(2011)
Mark Cameron Little, Decoy application servers ,(2010)