Thursday, July 2, 2009

Citations and links

Deception in Defense of Computer Systems from Cyber attack
Neil C. Rowe
Must read
US Naval Post Graduate School

A Framework for Deception
Must read
by Fred Cohen, Dave Lambert, Charles Preston, Nina Berry, Corbin Stewart, and Eric Thomas

SANS Reading Room - Policy Issues
Deception: A Healthy Part of Any Defense in-depth Strategy
By: Paul Anderson
October 31, 2003

Red Teaming Experiments with Deception Technologies
Fred Cohen, Irwin Marin, Jeanne Sappington, Corbin Stewart, and Eric Thomas
November 2001

Employing Deception in Information Systems to Thwart Adversary Reconnaissance-Phase Activities
Scott Gerwehr, Robert Weissler, Jamison Jo Medby, Robert H. Anderson, Jeff Rothenberg,
November 2000
RAND National Defense Research Institute

Defensive Computer-Security Deception Operations: Processes, Principles and Techniques.

James Joseph Yuill
A PhD dissertation, North Carolina State University,2006

Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques
Jim Yuill, Dorothy Denning, and Fred Feer
Journal of Information Warfare, 2006

Aggressive Network Self-Defense
Chapter 12 - When the tables turn: passive strike-back
Haroon Meer, Roelof Temmingh, Charl van der Walt

Reactive Phishing Defenses - Part 2

Antonio Forzieri
Blog post - 2008

Honeyfiles: Deceptive Files for Intrusion Detection
Jim Yuill, Mike Zappe, Dorothy Denning, and Fred Feer
Proceedings of the 2004 IEEE Workshop on Information Assurance

Know Your Enemy, 2nd Edition
Lance Spitzner & The Honeynet project
2004

LaBrea: Sticky Honeypot and IDS
Last rev 2003

The Luhn formula to generate credit cards

SSN Death index

Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework
Xinyuan Wang, Douglas S. Reeves, S. Felix Wu, Jim Yuill

Less harm, less worry, or how to improve network security by bounding system offensiveness
D. Bruschi, C. L., and E. Rosti

Fake Honeypots: A defensive Tactic for Cyberspace
Neil Rowe, Binh Duong, John Custy
June 2006

Red Pill... or how to detect VMM using (almost) one CPU instruction
Joanna Rutkowska
November 2004

Detecting Sebek Win32 Client
Tan Chew Keong
June 2004

Tell me how you liked the Toorcamp talk

Take the survey and give me some feedback

Slides and notes

Click to download the talk slides and notes (PDF, 3mb)