An event-trace language for software decoys
Michael, James Bret
MetadataShow full item record
Cyberspace is becoming the battlespace of the future, and military practices, like deception, seem to be suitable for defending information systems from attacks. In this thesis, we explore the concept of intelligent software decoys, which employ a form of software-based military deception. We developed a prototype of a high-level language for specifying intelligent software decoys. Our approach involves two stages. The specification language is intended to be part of a high-level user interface, making the implementation details of software decoys transparent to the information warrior. We provide a case study in which we demonstrate the utility of our specification language for specifying software decoys to counter a real-word attack program.
Approved for public release, distribution is unlimited
Showing items related by title, author, creator and subject.
Michael, James Bret; Auguston, Mikhail; Rowe, Neil C.; Riehle, Richard D. (Monterey, California. Naval Postgraduate School, 2002-06);We introduce the notion of an intelligent software decoy, and provide both an architecture and event-based lan!guage for automatic implementation of them. Our decoys detect and respond to patterns of suspicious behavior, ...
Frederick, Erwin E. (Monterey, California. Naval Postgraduate School, 2011-09);The development of honeypots as decoys designed to detect, investigate, and counterattack unauthorized use of information systems has produced an "arms race" between honeypots (computers designed solely to receive cyber ...
Phase I report on intelligent software decoys: technical feasibility and institutional issues in the context of homeland security Michael, James Bret; Rowe, Neil C.; Rothstein, Hy; Auguston, Mikhail; Drusinsky, Doron; Riehle, Richard (Monterey, California. Naval Postgraduate School, 2002-12-10); NPS-CS-03-001The purpose of this project is to explore the technical feasibility and institutional issues associated with applying software-based deception techniques as part of Homeland defense. At present, we refer to the embodiment ...