How intrusion detection can improve software decoy applications

Approved for public release; distribution is unlimited / This research concerns information security and computer-network defense. It addresses how to handle the information of log files and intrusion-detection systems to recognize when a system is under attack. But the goal is not the usual one of denying access to the attacker but providing a justification for deceptive actions to fool the attacker. We implemented a simple demonstration of how two different kinds of open-source intrusion-detection systems can efficiently pool data for this purpose. / Lieutenant Commander, Brazilian Navy

Identiferoai:union.ndltd.org:nps.edu/oai:calhoun.nps.edu:10945/1085
Date03 1900
CreatorsMonteiro, Valter
ContributorsRowe, Neil C., Fulp, J.D., Naval Postgraduate School (U.S.), Computer Science
PublisherMonterey, California. Naval Postgraduate School
Source SetsNaval Postgraduate School
Detected LanguageEnglish
TypeThesis
Formatxiv, 69 p. : ill. ;, application/pdf
RightsCopyright is reserved by the copyright owner.

Page generated in 0.0028 seconds