icon-carat-right menu search cmu-wordmark

Network Monitoring and Deceptive Defenses

Presentation
In this FloCon 2016 presentation, the authors discuss the use of network monitoring to support deceptive defenses.
Publisher

Software Engineering Institute

Abstract

In this FloCon 2016 presentation, we discuss the use of network monitoring to support deceptive defenses. In the context of this presentation, a deceptive defense is any defensive mechanism that is intended to frustrate or delay attackers by feeding them false information about a network's structure.  The classic example of such a defense is a honeypot, but recent research has resulted in multiple other defenses, including honeywords and honeyfiles.

We discuss the integration of deceptive defenses with network monitoring by focusing on the problem of file exfiltration—copying files from a network. A potential deceptive defense against exfiltration is to artificially inflate the size of critical files (e.g., proprietary information, password files). Such a defense is most effective when combined with situational awareness—an understanding of how large these files have to be to impose a risk on an attacker.

Part of a Collection

FloCon 2016 Presentations

This content was created for a conference series or symposium and does not necessarily reflect the positions and views of the Software Engineering Institute.