2016 Resilience Week (RWS) 2016
DOI: 10.1109/rweek.2016.7573310
|View full text |Cite
|
Sign up to set email alerts
|

Enabling defensive deception in distributed system environments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
2
1
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…On a host-level, machine-learning and malware behavioral analysis techniques can turn attackers' own malware deception back onto them, altering the attacker's decision making [43]. A prototype called KAGE used software defined networking (SDN) to establish an "alternate reality" among distributed systems, deploying deceptive counterparts to attacker-desired services in real time, based on patternmatching rules [47].…”
Section: Defensive Deception Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…On a host-level, machine-learning and malware behavioral analysis techniques can turn attackers' own malware deception back onto them, altering the attacker's decision making [43]. A prototype called KAGE used software defined networking (SDN) to establish an "alternate reality" among distributed systems, deploying deceptive counterparts to attacker-desired services in real time, based on patternmatching rules [47].…”
Section: Defensive Deception Researchmentioning
confidence: 99%
“…High-interaction decoys and responsive deception tactics have the potential to magnify disruption to the attacker. Other taxonomies of deception actions exist to guide the creation of a more robust deception action space [47][41].…”
Section: Defensive Deception Action Spacementioning
confidence: 99%
“…There is also extensive work done on utilizing adversarial transferability in other forms of adversarial attacks, deep learning vulnerabilities in DNNs, and black-box attacks in machine learning. Among other interesting work that served as motivation for this thesis include: utilizing honeypots in defense techniques, such as design and implementation of a honey-trap [12]; deception in decentralized system environments [34]; and using containers in deceptive honeypots [18].…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, Soule et al [34] described active defensive deception in the context of distributed systems, and built a prototype that creates an alternate reality in which to trap, learn about, and manipulate adversarial actors without affecting normal and legitimate operations. This prototype, called KAGE, employs SDN and virtualization in order to create a malleable substrate in which deception can occur.…”
Section: Toolsmentioning
confidence: 99%