Deception in Defense of Computer Systems from Cyber attack
Neil C. Rowe
Must read
US Naval Post Graduate School
A Framework for Deception
Must read
by Fred Cohen, Dave Lambert, Charles Preston, Nina Berry, Corbin Stewart, and Eric Thomas
SANS Reading Room - Policy Issues
Deception: A Healthy Part of Any Defense in-depth Strategy
By: Paul Anderson
October 31, 2003
Red Teaming Experiments with Deception Technologies
Fred Cohen, Irwin Marin, Jeanne Sappington, Corbin Stewart, and Eric Thomas
November 2001
Employing Deception in Information Systems to Thwart Adversary Reconnaissance-Phase Activities
Scott Gerwehr, Robert Weissler, Jamison Jo Medby, Robert H. Anderson, Jeff Rothenberg,
November 2000
RAND National Defense Research Institute
Defensive Computer-Security Deception Operations: Processes, Principles and Techniques.
James Joseph Yuill
A PhD dissertation, North Carolina State University,2006
Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques
Jim Yuill, Dorothy Denning, and Fred Feer
Journal of Information Warfare, 2006
Aggressive Network Self-Defense
Chapter 12 - When the tables turn: passive strike-back
Haroon Meer, Roelof Temmingh, Charl van der Walt
Reactive Phishing Defenses - Part 2
Antonio Forzieri
Blog post - 2008
Honeyfiles: Deceptive Files for Intrusion Detection
Jim Yuill, Mike Zappe, Dorothy Denning, and Fred Feer
Proceedings of the 2004 IEEE Workshop on Information Assurance
Know Your Enemy, 2nd Edition
Lance Spitzner & The Honeynet project
2004
LaBrea: Sticky Honeypot and IDS
Last rev 2003
The Luhn formula to generate credit cards
SSN Death index
Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework
Xinyuan Wang, Douglas S. Reeves, S. Felix Wu, Jim Yuill
Less harm, less worry, or how to improve network security by bounding system offensiveness
D. Bruschi, C. L., and E. Rosti
Fake Honeypots: A defensive Tactic for Cyberspace
Neil Rowe, Binh Duong, John Custy
June 2006
Red Pill... or how to detect VMM using (almost) one CPU instruction
Joanna Rutkowska
November 2004
Detecting Sebek Win32 Client
Tan Chew Keong
June 2004
Thursday, July 2, 2009
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment