1 / 5

Dynamic Network-Based Strategy for Managing Security System Elements and Intrusion Detection

This paper proposes a comprehensive strategy for dynamically managing security elements in network routing and intrusion detection systems. By leveraging both real and faux data, the system introduces various detection methods such as rule-based, stateful, and intelligent detection, alongside anomaly recognition and attack classification. Key features include monitoring system integrity, isolating attacks, redirecting them away from critical systems, and utilizing artificial opponents to enhance data collection. Additionally, watermarking techniques are employed to create believable faux data, facilitating improved defense against attackers and maintaining evidence for potential extortion schemes.

tahlia
Télécharger la présentation

Dynamic Network-Based Strategy for Managing Security System Elements and Intrusion Detection

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Flytrap: A Proposed Network-Based Strategy for Dynamically Managing Security

  2. System Elements Network routing Intrusion Detection Artificial Opponent Attack Database “Real” Systems “Faux” Systems Real data Faux data Faux Data Watermarking

  3. Detection Strategies • No detection • Rule-based detection • Simple firewall (stateless) • Stateful detection • Intelligent detection • Anomaly detection • Attack classification

  4. Observation • Monitor integrity of all systems • Isolate attacks to appropriate systems • Redirect attacks away from real systems • Generate attack logs usable by IDS and artificial opponents • Use an artificial opponent to collect more data • Conduct observation on system containing no “real” data

  5. (Mis)information • Use dynamically generated data to misinform attacker • Create a “believable” yet harmless base • Use a watermarking algorithm to produce variations on base • Store watermark as evidence of attack • Data may be stored on attacker’s system • Data may be used in extortion schemes

More Related