Software Decoys for Software Counterintelligence
Loading...
Authors
Rowe, Neil C.
Michael, J. Bret
Auguston, Mikhail
Riehle, Richard
Subjects
Advisors
Date of Issue
2002-06
Date
June 2002
Publisher
Monterey, California. Naval Postgraduate School
Language
Abstract
Some information systems are critical to defend against malicious attack. Yet they often rely on just the same countermeasures as any
system ? firewalls, authentication, intrusion-detection systems, and encryp!tion ? although politically motivated attackers may be far
more determined than hackers to bring them down. Future information security will increasingly use ideas from military defensive
tactics [3] to effectively defend critical information sys!tems. This will include automatic "counterintelligence" with deliberately
deceptive behavior, what we call "software decoys". Decoys can deceive attackers into thinking their attacks have succeeded while
protecting key assets at least temporarily.
Type
Conference Paper
Description
This paper is to appear in IANewsletter, June 2002.
Series/Report No
Department
Computer Science (CS)
Organization
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
IANewsletter, June 2002
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
