An Experiment in Software Decoy Design

作者: Georgios Fragkos , Mikhail Auguston , J. Bret Michael

DOI: 10.1007/978-0-387-35691-4_22

关键词:

摘要: This paper presents an implementation of integrated intrusion detection and system response based on call instrumentation. We introduce the notion intelligent software decoy as a means for to patterns suspicious behavior. A prototype such has been developed using NAI Labs’ Generic Software Wrapper Toolkit. present case study ftp-based intrusion.

参考文章(8)
Richard D. Riehle, Mikhail Auguston, Neil C. Rowe, James Bret Michael, Software Decoys: Intrusion Detection and Countermeasures Monterey, California. Naval Postgraduate School. ,(2002)
Douglas Kilpatrick, Lee Badger, Timothy Fraser, Calvin Ko, Detecting and countering system intrusions using software wrappers usenix security symposium. pp. 11- 11 ,(2000)
Georgios Fragkos, An event-trace language for software decoys Monterey, California. Naval Postgraduate School. ,(2002)
Steven T. Eckmann, Giovanni Vigna, Richard A. Kemmerer, STATL: an attack language for state-based intrusion detection Journal of Computer Security. ,vol. 10, pp. 71- 103 ,(2002) , 10.3233/JCS-2002-101-204
G. Vigna, S.T. Eckmann, R.A. Kemmerer, The STAT tool suite darpa information survivability conference and exposition. ,vol. 2, pp. 46- 55 ,(2000) , 10.1109/DISCEX.2000.821508
R. Sekar, Thomas F. Bowen, Mark E. Segal, On preventing intrusions by process behavior monitoring ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1. pp. 29- 40 ,(1999)
Fred Cohen, Deanna Koike, Feature: Leading attackers through attack graphs with deceptions Computers & Security. ,vol. 22, pp. 402- 411 ,(2003) , 10.1016/S0167-4048(03)00506-6
Steven J. Templeton, Karl Levitt, A requires/provides model for computer attacks new security paradigms workshop. pp. 31- 38 ,(2001) , 10.1145/366173.366187