Software Decoys for Software Counterintelligence

Loading...
Thumbnail Image
Authors
Rowe, Neil C.
Michael, J. Bret
Auguston, Mikhail
Riehle, Richard
Subjects
Advisors
Date of Issue
2002-06
Date
June 2002
Publisher
Monterey, California. Naval Postgraduate School
Language
Abstract
Some information systems are critical to defend against malicious attack. Yet they often rely on just the same countermeasures as any system ? firewalls, authentication, intrusion-detection systems, and encryp!tion ? although politically motivated attackers may be far more determined than hackers to bring them down. Future information security will increasingly use ideas from military defensive tactics [3] to effectively defend critical information sys!tems. This will include automatic "counterintelligence" with deliberately deceptive behavior, what we call "software decoys". Decoys can deceive attackers into thinking their attacks have succeeded while protecting key assets at least temporarily.
Type
Conference Paper
Description
This paper is to appear in IANewsletter, June 2002.
Series/Report No
Department
Computer Science (CS)
Organization
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
IANewsletter, June 2002
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Collections