基于欺骗的网络安全中的战略防御与攻击

Daniel Fraunholz, H. Schotten
{"title":"基于欺骗的网络安全中的战略防御与攻击","authors":"Daniel Fraunholz, H. Schotten","doi":"10.1109/ICOIN.2018.8343103","DOIUrl":null,"url":null,"abstract":"Prodigious increases in interconnectivity, highly professionalized electronic crime and espionage syndicates expose today's networks and applications to an extensive threat level. Established defense mechanisms hardly cope with this emerging threat landscape. Adversaries implemented counter measures for most defense mechanisms such as polymorphism to circumvent antivirus software, encryption against deep packet inspection and reverse connections to avoid ingress filtering or poorly configured firewalls. Deception based information security is a promising solution to enhance those established mechanisms. This research paper transfers strategic security and defense concepts from operations research, reliability engineering and game theory to deception based information security mechanisms. Feature and parameter sets for the proposed model are analyzed and discussed. Based on our developed model, network security implications are analyzed in defender and attacker perspectives.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Strategic defense and attack in deception based network security\",\"authors\":\"Daniel Fraunholz, H. Schotten\",\"doi\":\"10.1109/ICOIN.2018.8343103\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Prodigious increases in interconnectivity, highly professionalized electronic crime and espionage syndicates expose today's networks and applications to an extensive threat level. Established defense mechanisms hardly cope with this emerging threat landscape. Adversaries implemented counter measures for most defense mechanisms such as polymorphism to circumvent antivirus software, encryption against deep packet inspection and reverse connections to avoid ingress filtering or poorly configured firewalls. Deception based information security is a promising solution to enhance those established mechanisms. This research paper transfers strategic security and defense concepts from operations research, reliability engineering and game theory to deception based information security mechanisms. Feature and parameter sets for the proposed model are analyzed and discussed. Based on our developed model, network security implications are analyzed in defender and attacker perspectives.\",\"PeriodicalId\":228799,\"journal\":{\"name\":\"2018 International Conference on Information Networking (ICOIN)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Information Networking (ICOIN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOIN.2018.8343103\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Information Networking (ICOIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN.2018.8343103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

摘要

互连性的惊人增长,高度专业化的电子犯罪和间谍集团使当今的网络和应用程序面临广泛的威胁。现有的防御机制难以应对这种新出现的威胁形势。攻击者对大多数防御机制都实施了反击措施,比如利用多态性来绕过杀毒软件,利用加密来对抗深度包检测,利用反向连接来避免入侵过滤或配置不当的防火墙。基于欺骗的信息安全是一种很有前途的解决方案,可以增强这些已建立的机制。本文将运筹学、可靠性工程和博弈论中的战略安全与防御概念转移到基于欺骗的信息安全机制中。对所提模型的特征集和参数集进行了分析和讨论。基于我们开发的模型,从防御者和攻击者的角度分析了网络安全的含义。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Strategic defense and attack in deception based network security
Prodigious increases in interconnectivity, highly professionalized electronic crime and espionage syndicates expose today's networks and applications to an extensive threat level. Established defense mechanisms hardly cope with this emerging threat landscape. Adversaries implemented counter measures for most defense mechanisms such as polymorphism to circumvent antivirus software, encryption against deep packet inspection and reverse connections to avoid ingress filtering or poorly configured firewalls. Deception based information security is a promising solution to enhance those established mechanisms. This research paper transfers strategic security and defense concepts from operations research, reliability engineering and game theory to deception based information security mechanisms. Feature and parameter sets for the proposed model are analyzed and discussed. Based on our developed model, network security implications are analyzed in defender and attacker perspectives.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信