An event-trace language for software decoys

作者: Georgios Fragkos

DOI:

关键词:

摘要: Abstract : Cyberspace is becoming the battlespace of future, and military practices, like deception, seem to be suitable for defending information systems from attacks, In this thesis, we explore concept intelligent software decoys, which employ a form software-based deception. We developed prototype high-level language specifying decoys. Our approach involves two stages. The specification intended part user interface, making implementation details decoys transparent warrior. provide case study in demonstrate utility our counter real-word attack program.

参考文章(6)
Richard D. Riehle, Mikhail Auguston, Neil C. Rowe, James Bret Michael, Software Decoys: Intrusion Detection and Countermeasures Monterey, California. Naval Postgraduate School. ,(2002)
Douglas Kilpatrick, Lee Badger, Timothy Fraser, Calvin Ko, Detecting and countering system intrusions using software wrappers usenix security symposium. pp. 11- 11 ,(2000)
Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer, STATL: an attack language for state-based intrusion detection Journal of Computer Security. ,vol. 10, pp. 71- 103 ,(2002) , 10.3233/JCS-2002-101-204
R. Sekar, Thomas F. Bowen, Mark E. Segal, On preventing intrusions by process behavior monitoring ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 29- 40 ,(1999)
Steven J. Templeton, Karl Levitt, A requires/provides model for computer attacks new security paradigms workshop. pp. 31- 38 ,(2001) , 10.1145/366173.366187
G. Vigna, R.A. Kemmerer, NetSTAT: a network-based intrusion detection approach annual computer security applications conference. pp. 25- 34 ,(1998) , 10.1109/CSAC.1998.738566