作者: Samuel T. Trassare , Robert Beverly , David Alderson
关键词:
摘要: Civilian and military networks are continually probed for vulnerabilities. Cyber criminals, autonomous botnets under their control, regularly scan in search of vulnerable systems to co-opt. Military more sophisticated adversaries may also map as part reconnaissance intelligence gathering. This paper focuses on attempting a network's infrastructure, i.e., the critical routers links supporting network. We develop novel methodology, rooted principles deception, deceiving malicious traceroute probe influencing structure network inferred by mapping adversary. Our Linux-based implementation runs kernel module at border router present deceptive external topology. construct proof-of-concept test show that remote adversary using defended can be presented with false topology defender's choice.