Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop 2013
DOI: 10.1145/2459976.2460014
|View full text |Cite
|
Sign up to set email alerts
|

Machine-oriented biometrics and cocooning for dynamic network defense

Abstract: Current cyber defenses result in binary access for attackers who have compromised a host: either the attacker has full access to the machine or the intrusion is detected and the machine is removed from the network. This is the result of an apparent duality when determining if a system is compromised; i.e., either it is or it is not. However, analysts usually make decisions based upon many pieces of data and their own experience, which may lend itself to higher resolution in the decision-making process. We prop… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…A specific example of a proactive approach is changing the IP addresses of machines on a network according to some kind of schedule [6]. An example reactive approach is MOB-C, which requires the detection of attempted lateral movement that then triggers "cocooning" or switching a potential adversary from real services to one or more emulated services [7]. Figure 1 shows a potential division of defensive techniques by domain, breaking potential areas of DD application into network-and host-based approaches first.…”
Section: Proactive Vs Reactivementioning
confidence: 99%
“…A specific example of a proactive approach is changing the IP addresses of machines on a network according to some kind of schedule [6]. An example reactive approach is MOB-C, which requires the detection of attempted lateral movement that then triggers "cocooning" or switching a potential adversary from real services to one or more emulated services [7]. Figure 1 shows a potential division of defensive techniques by domain, breaking potential areas of DD application into network-and host-based approaches first.…”
Section: Proactive Vs Reactivementioning
confidence: 99%