Deception in defense of computer systems from cyber-attack

作者: Neil C. Rowe

DOI: 10.4018/978-1-59140-991-5.CH013

关键词:

摘要: This is a chapter in Cyber War and Terrorism, ed. A. Colarik L. Janczewski, Hershey, PA: The Idea Group, 2007.

参考文章(10)
Neil C. Rowe, Donald P. Julian, James Bret Michael, Experiments with Deceptive Software Responses to Buffer-Based Attacks. IAW. pp. 43- 44 ,(2003)
Hy S. Rothstein, Neil C. Rowe, Two Taxonomies of Deception for Attacks on Information Systems Monterey, California. Naval Postgraduate School. ,(2004)
L. Spitzner, Honeypots: Tracking Hackers ,(2002)
Roger Thompson, Why spyware poses multiple threats to security Communications of The ACM. ,vol. 48, pp. 41- 43 ,(2005) , 10.1145/1076211.1076237
F. Cohen, D. Koike, Misleading attackers with deception Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004.. pp. 30- 37 ,(2004) , 10.1109/IAW.2004.1437794
W. Tirenin, D. Faatz, A concept for strategic cyber defense military communications conference. ,vol. 1, pp. 458- 463 ,(1999) , 10.1109/MILCOM.1999.822725
L. Spitzner, The Honeynet Project: trapping the hackers ieee symposium on security and privacy. ,vol. 1, pp. 15- 23 ,(2003) , 10.1109/MSECP.2003.1193207
E. John Custy, Neil C. Rowe, Binh T. Duong, Fake Honeypots: A Defensive Tactic for Cyberspace Monterey, California. Naval Postgraduate School. ,(2006)