{"title":"基于欺骗的网络安全中的战略防御与攻击","authors":"Daniel Fraunholz, H. Schotten","doi":"10.1109/ICOIN.2018.8343103","DOIUrl":null,"url":null,"abstract":"Prodigious increases in interconnectivity, highly professionalized electronic crime and espionage syndicates expose today's networks and applications to an extensive threat level. Established defense mechanisms hardly cope with this emerging threat landscape. Adversaries implemented counter measures for most defense mechanisms such as polymorphism to circumvent antivirus software, encryption against deep packet inspection and reverse connections to avoid ingress filtering or poorly configured firewalls. Deception based information security is a promising solution to enhance those established mechanisms. This research paper transfers strategic security and defense concepts from operations research, reliability engineering and game theory to deception based information security mechanisms. Feature and parameter sets for the proposed model are analyzed and discussed. Based on our developed model, network security implications are analyzed in defender and attacker perspectives.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Strategic defense and attack in deception based network security\",\"authors\":\"Daniel Fraunholz, H. Schotten\",\"doi\":\"10.1109/ICOIN.2018.8343103\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Prodigious increases in interconnectivity, highly professionalized electronic crime and espionage syndicates expose today's networks and applications to an extensive threat level. Established defense mechanisms hardly cope with this emerging threat landscape. Adversaries implemented counter measures for most defense mechanisms such as polymorphism to circumvent antivirus software, encryption against deep packet inspection and reverse connections to avoid ingress filtering or poorly configured firewalls. Deception based information security is a promising solution to enhance those established mechanisms. This research paper transfers strategic security and defense concepts from operations research, reliability engineering and game theory to deception based information security mechanisms. Feature and parameter sets for the proposed model are analyzed and discussed. Based on our developed model, network security implications are analyzed in defender and attacker perspectives.\",\"PeriodicalId\":228799,\"journal\":{\"name\":\"2018 International Conference on Information Networking (ICOIN)\",\"volume\":\"10 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Information Networking (ICOIN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOIN.2018.8343103\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Information Networking (ICOIN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOIN.2018.8343103","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Strategic defense and attack in deception based network security
Prodigious increases in interconnectivity, highly professionalized electronic crime and espionage syndicates expose today's networks and applications to an extensive threat level. Established defense mechanisms hardly cope with this emerging threat landscape. Adversaries implemented counter measures for most defense mechanisms such as polymorphism to circumvent antivirus software, encryption against deep packet inspection and reverse connections to avoid ingress filtering or poorly configured firewalls. Deception based information security is a promising solution to enhance those established mechanisms. This research paper transfers strategic security and defense concepts from operations research, reliability engineering and game theory to deception based information security mechanisms. Feature and parameter sets for the proposed model are analyzed and discussed. Based on our developed model, network security implications are analyzed in defender and attacker perspectives.