DocumentCode :
3677718
Title :
CINDAM: Customized Information Networks for Deception and Attack Mitigation
Author :
Seth Robertson;Scott Alexander;Josephine Micallef;Jonathan Pucci;James Tanis;Anthony Macera
Author_Institution :
Appl. Commun. Sci., Basking Ridge, NJ, USA
fYear :
2015
Firstpage :
114
Lastpage :
119
Abstract :
The topology of networks typically remains static over long periods of time, giving attackers the advantage of long planning cycles to develop, test, and refine targeted attacks. The CINDAM design preempts the attacker by creating ephemeral, per-host views of the protected enclave to transform the constant topology of computing networks into deceptive, mutable, and individualized ones that are able to impede nation-state attacks while still providing mission services to legitimate users. CINDAM achieves this deception without affecting network operations and without modifying client and server software. CINDAM is being implemented using software-defined networking technology for a cost-effective cyber deception solution.
Keywords :
"Servers","IP networks","Network topology","Ports (Computers)","Reconnaissance","Topology","Conferences"
Publisher :
ieee
Conference_Titel :
Self-Adaptive and Self-Organizing Systems Workshops (SASOW), 2015 IEEE International Conference on
Type :
conf
DOI :
10.1109/SASOW.2015.23
Filename :
7306566
Link To Document :
بازگشت