Active defence through deceptive IPS
نویسندگان
چکیده
Modern security mechanisms such as Unified Threat Management (UTM), Next-Generation Firewalls and Security Information and Event Management (SIEM) have become more sophisticated over recent years, promising advanced security features and immediate mitigation of the most advanced threats. While this appears promising, in practice even this cutting-edge technology often fails to protect modern organisations as they are being targeted by attacks that were previously unknown to the security industry. Most security mechanisms are based on a database of previously known attack artefacts (signatures) and they will fail on slightly modified or new attacks. The need for threat intelligence is in complete contrast with the way current security solutions are responding to the threats they identify, as they immediately block them without attempting to acquire any further information. In this report, we present and evaluate a security mechanism that operates as an intrusion prevention system which uses honeypots to deceive an attacker, prevent a security breach and which allows the potential acquisition of intelligence on each intrusion attempt. a aThis article is published online by Computer Weekly as part of the 2017 Royal Holloway information security thesis series http://www.computerweekly.com/ehandbook/Active-defence-through-deceptive-IPS. It is based on an MSc dissertation written as part of the MSc in Information Security at the ISG, Royal Holloway, University of London. The full thesis is published on the ISG’s website at https://www.royalholloway.ac.uk/isg/.
منابع مشابه
If you go down to the Internet today – Deceptive Honeypots
ABSTRACT This is preliminary research into the effectiveness of deceptive defensive measures in particular honeypots that use deceit as a primary defensive and offensive mechanism. Initial research has been conducted using the Deception Tool Kit and its ability to fool commonly available network scanning tools such as Nessus and Nmap The preliminary research indicates that these deceptive tools...
متن کاملDeceptive but Not Honest Manipulative Actions Are Associated with Increased Interaction between Middle and Inferior Frontal gyri
The prefrontal cortex is believed to be responsible for execution of deceptive behavior and its involvement is associated with greater cognitive efforts. It is also generally assumed that deception is associated with the inhibition of default honest actions. However, the precise neurophysiological mechanisms underlying this process remain largely unknown. The present study was aimed to use func...
متن کاملTo Deceive or Not to Deceive? Mimicry, Deception & Regimes in Tag-based Models
The tag-based computational model of cooperation described in Riolo et al. (2001) was extended in a series of experiments that examined the impact of tactical deceptive mimicry on cooperation, tolerance, and the emergence of regimes. Under all conditions, tactical deceptive mimicry increased the population cooperation above that of the base case. Allowing deceptive tolerance or deceptive propen...
متن کاملAlterations in antioxidant defence in the early life stages of silver carp, Hypophthalmichthys molitrix
Fish larvae experience major cellular and biochemical changes during their early life stages.The aim of the present study was to evaluate alterations in the antioxidant status and values oflipid peroxidation and vitamin C content during the different life developmental stages ofHypophthalmichthys molitrix. Eggs and larvae were sampled at fertilization, organogenesis,eyed egg, hatch, active feed...
متن کاملNew Hashing Algorithm for Use in TCP Reassembly Module of IPS
Since last decade, IDS/ IPS has gained popularity in protecting large networks. They can employ signature – based techniques and/or flow-based techniques to prevent intrusion from outside/ inside the network they are trying to protect. Signature – based IDS/ IPS can be stateless or stateful. Stateful IDS can store the state of the protocol and use it for better detection of malware. In the case...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017