flytrap a proposed network based strategy for dynamically managing security n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Flytrap: A Proposed Network-Based Strategy for Dynamically Managing Security PowerPoint Presentation
Download Presentation
Flytrap: A Proposed Network-Based Strategy for Dynamically Managing Security

Loading in 2 Seconds...

play fullscreen
1 / 5
tahlia

Flytrap: A Proposed Network-Based Strategy for Dynamically Managing Security - PowerPoint PPT Presentation

85 Views
Download Presentation
Flytrap: A Proposed Network-Based Strategy for Dynamically Managing Security
An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Flytrap: A Proposed Network-Based Strategy for Dynamically Managing Security

  2. System Elements Network routing Intrusion Detection Artificial Opponent Attack Database “Real” Systems “Faux” Systems Real data Faux data Faux Data Watermarking

  3. Detection Strategies • No detection • Rule-based detection • Simple firewall (stateless) • Stateful detection • Intelligent detection • Anomaly detection • Attack classification

  4. Observation • Monitor integrity of all systems • Isolate attacks to appropriate systems • Redirect attacks away from real systems • Generate attack logs usable by IDS and artificial opponents • Use an artificial opponent to collect more data • Conduct observation on system containing no “real” data

  5. (Mis)information • Use dynamically generated data to misinform attacker • Create a “believable” yet harmless base • Use a watermarking algorithm to produce variations on base • Store watermark as evidence of attack • Data may be stored on attacker’s system • Data may be used in extortion schemes