1 / 5

Flytrap: A Proposed Network-Based Strategy for Dynamically Managing Security

Flytrap: A Proposed Network-Based Strategy for Dynamically Managing Security . System Elements. Network routing. Intrusion Detection. Artificial Opponent. Attack Database. “Real” Systems. “Faux” Systems. Real data. Faux data. Faux Data Watermarking. Detection Strategies.

tahlia
Download Presentation

Flytrap: A Proposed Network-Based Strategy for Dynamically Managing Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Flytrap: A Proposed Network-Based Strategy for Dynamically Managing Security

  2. System Elements Network routing Intrusion Detection Artificial Opponent Attack Database “Real” Systems “Faux” Systems Real data Faux data Faux Data Watermarking

  3. Detection Strategies • No detection • Rule-based detection • Simple firewall (stateless) • Stateful detection • Intelligent detection • Anomaly detection • Attack classification

  4. Observation • Monitor integrity of all systems • Isolate attacks to appropriate systems • Redirect attacks away from real systems • Generate attack logs usable by IDS and artificial opponents • Use an artificial opponent to collect more data • Conduct observation on system containing no “real” data

  5. (Mis)information • Use dynamically generated data to misinform attacker • Create a “believable” yet harmless base • Use a watermarking algorithm to produce variations on base • Store watermark as evidence of attack • Data may be stored on attacker’s system • Data may be used in extortion schemes

More Related