Delaying-type responses for use by software decoys
Approved for public release, distribution is unlimited === Modern intrusion detection systems have become highly reliable in identifying a malicious user on a computer system. Their limitations, though, are increasing the need for an intelligent response to an intrusion. In contrast, intelligent sof...
Main Author: | Julian, Donald P. |
---|---|
Other Authors: | Rowe, Neil C. |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Online Access: | http://hdl.handle.net/10945/5043 |
Similar Items
-
An event-trace language for software decoys
by: Fragkos, Georgios
Published: (2012) -
How intrusion detection can improve software decoy applications
by: Monteiro, Valter
Published: (2012) -
Using decoys to block SPIT in the IMS
by: Salehin, S M Akramus
Published: (2014) -
Decoy effects and brands
by: Kim, J, et al.
Published: (2011) -
Inhibition of androgen receptor by decoy molecules delays progression to castration-recurrent prostate cancer.
by: Jae-Kyung Myung, et al.
Published: (2017-01-01)