Vis enkel innførsel

dc.contributor.authorJaatun, Martin Gilje
dc.contributor.authorNyre, Åsmund Ahlmann
dc.contributor.authorSørensen, Jan Tore
dc.date.accessioned2017-02-07T07:12:46Z
dc.date.available2017-02-07T07:12:46Z
dc.date.created2017-02-06T15:22:33Z
dc.date.issued2007
dc.identifier.citationLecture Notes in Computer Science. 2007, 4680 197-208.nb_NO
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/11250/2429686
dc.description.abstractA system with a high degree of availability and survivability can be created via service duplication on disparate server platforms, where a compromise via a previously unknown attack is detected by a voting mechanism. However, shutting down the compromised component will inform the attacker that the subversion attempt was unsuccessful, and might lead her to explore other avenues of attack. This paper presents a better solution by transforming the compromised component to a state of honeypot; removing it from duty, while providing the attacker with bogus data. This provides the administrator of the target system with extra time to implement adequate security measures while the attacker is busy “exploiting” the honeypot. As long as the majority of components remain uncompromised, the system continues to deliver service to legitimate users.nb_NO
dc.language.isoengnb_NO
dc.titleSurvival by Deceptionnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.source.pagenumber197-208nb_NO
dc.source.volume4680nb_NO
dc.source.journalLecture Notes in Computer Sciencenb_NO
dc.identifier.doi10.1007/978-3-540-75101-4_19
dc.identifier.cristin1447505
cristin.unitcode7401,90,13,0
cristin.unitnameSystemutvikling og sikkerhet
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel