Show simple item record

dc.contributor.advisorRowe, Neil C.
dc.contributor.advisorMichael, J. Bret
dc.contributor.authorJulian, Donald P.
dc.dateSeptember 2002
dc.date.accessioned2012-03-14T17:44:00Z
dc.date.available2012-03-14T17:44:00Z
dc.date.issued2002-09
dc.identifier.urihttps://hdl.handle.net/10945/5043
dc.description.abstractModern intrusion detection systems have become highly reliable in identifying a malicious user on a computer system. Their limitations, though, are increasing the need for an intelligent response to an intrusion. In contrast, intelligent software decoys provide autonomous software-based responses to identified intrusions. In this thesis, we explore conducting military deception, focusing on the use of software-driven simulations to respond to the actions of intruders. In particular, this thesis focuses on a model of a simple deceptive response that is intended to protect a search-type program from a buffer-overflow attack. During our study, we found that after identifying an attack attempt, simulating system saturation with processing delays worked well to deceive a prospective attacker. We also experimented with providing confusing reactions to an identified attack attempt, such as simulated network login screens and fake root-shells. The results were successful, simple reactions to intrusions that mimicked intended system interaction, and they proved to be adequate at implementing the deception principles we studied.en_US
dc.description.urihttp://archive.org/details/delayingtyperesp109455043
dc.format.extentxvi, 59 p. : ill.en_US
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.subject.lcshComputersen_US
dc.subject.lcshAccess controlen_US
dc.subject.lcshComputer securityen_US
dc.titleDelaying-type responses for use by software decoysen_US
dc.typeThesisen_US
dc.contributor.departmentComputer Science (CS)
dc.subject.authorIntelligent software decoysen_US
dc.subject.authorIntrusion detectionen_US
dc.subject.authorComputer deceptionen_US
dc.subject.authorDecoy responseen_US
dc.subject.authorMilitary deceptionen_US
dc.subject.authorSimple deceptive responseen_US
dc.description.serviceMajor, United States Marine Corpsen_US
etd.thesisdegree.nameM.S. in Computer Scienceen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineComputer Scienceen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
etd.verifiednoen_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record