Counterintelligence through malicious code analysis
dc.contributor.advisor | Eagle, Christopher | |
dc.contributor.author | Murphy, Edmond J. | |
dc.date.accessioned | 2012-03-14T17:38:23Z | |
dc.date.available | 2012-03-14T17:38:23Z | |
dc.date.issued | 2007-06 | |
dc.identifier.uri | https://hdl.handle.net/10945/3441 | |
dc.description.abstract | As computer network technology continues to grow, so does the reliance on this technology for everyday business functionality. To appeal to customers and employees alike, businesses are seeking an increased online presence, and to increase productivity the same businesses are computerizing their day-to-day operations. The combination of a publicly accessible interface to the businesses' network, and the increase in the amount of intellectual property present on these networks presents serious risks. All of this intellectual property now faces constant attacks from a wide variety of malicious software that is intended to uncover company and government secrets. Every year, billions of dollars are invested in preventing and recovering from the introduction of malicious code into a system. However, there is little research being done on leveraging these attacks for counterintelligence opportunities. With the ever increasing number of vulnerable computers on the Internet, the task of attributing these attacks to an organization or a single person is a daunting one. This thesis will demonstrate the idea of intentionally running a piece of malicious code in a secure environment in order to gain counterintelligence on an attacker. | en_US |
dc.description.uri | http://archive.org/details/counterintellige109453441 | |
dc.format.extent | xiv, 89 p. ; | en_US |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.subject.lcsh | Computer science | en_US |
dc.subject.lcsh | Commerce | en_US |
dc.subject.lcsh | Intelligence service | en_US |
dc.title | Counterintelligence through malicious code analysis | en_US |
dc.type | Thesis | en_US |
dc.contributor.secondreader | Dinolt, George | |
dc.contributor.corporate | Naval Postgraduate School | |
dc.description.service | Federal Cyber Corporation author (civilian). | en_US |
dc.identifier.oclc | 156992862 | |
etd.thesisdegree.name | M.S. | en_US |
etd.thesisdegree.level | Masters | en_US |
etd.thesisdegree.discipline | Computer Science | en_US |
etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
etd.verified | no | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |
Files in this item
This item appears in the following Collection(s)
-
1. Thesis and Dissertation Collection, all items
Publicly releasable NPS Theses, Dissertations, MBA Professional Reports, Joint Applied Projects, Systems Engineering Project Reports and other NPS degree-earning written works.