2007 IEEE SMC Information Assurance and Security Workshop 2007
DOI: 10.1109/iaw.2007.381927
|View full text |Cite
|
Sign up to set email alerts
|

Thwarting Cyber-Attack Reconnaissance with Inconsistency and Deception

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 15 publications
0
11
0
Order By: Relevance
“…For instance, Rowe and Goh observed increasing number of attacks after the system went down and came back up. This analysis suggests that keeping an existing long-used IP address and responding normally to packets might lead to a decrease in the number of attacks [38].…”
Section: Counter Counter-deceptionmentioning
confidence: 99%
“…For instance, Rowe and Goh observed increasing number of attacks after the system went down and came back up. This analysis suggests that keeping an existing long-used IP address and responding normally to packets might lead to a decrease in the number of attacks [38].…”
Section: Counter Counter-deceptionmentioning
confidence: 99%
“…Rowe presents Naval Postgraduate School experimental results that demonstrate that attackers can be manipulated by deception [1], and describes a spoofing channel application used to serve spoofs to intruders as a response to Intrusion Detection System (IDS) alerts [2]. Provos describes how fingerprinting tools (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…It can be aided by metrics for detecting national, political, social, or cultural bias in the targets of malicious network traffic. Standard statistical techniques can suggest that the victims represent a particular political perspective or country's interest more than a random sample would (Rowe and Goh, 2007). For instance, a significance test on a linear metric encoding political or social agendas can provide a first approximation, while the Kullback-Leibler divergence can characterize the extent of difference between expected and observed traffic distributions.…”
Section: Network Monitoring For Cyberweaponsmentioning
confidence: 99%