Software Decoys for Software Counterintelligence
Rowe, Neil C.
Michael, J. Bret
MetadataShow full item record
Some information systems are critical to defend against malicious attack. Yet they often rely on just the same countermeasures as any system ? firewalls, authentication, intrusion-detection systems, and encryp!tion ? although politically motivated attackers may be far more determined than hackers to bring them down. Future information security will increasingly use ideas from military defensive tactics  to effectively defend critical information sys!tems. This will include automatic "counterintelligence" with deliberately deceptive behavior, what we call "software decoys". Decoys can deceive attackers into thinking their attacks have succeeded while protecting key assets at least temporarily.
This paper is to appear in IANewsletter, June 2002.