Deception in defense of computer systems from cyberattack

@inproceedings{Rowe2007DeceptionID,
  title={Deception in defense of computer systems from cyberattack},
  author={Neil C. Rowe},
  year={2007}
}
While computer systems can be quite susceptible to deception by attackers, deception by defenders has increasingly been investigated in recent years. Military history has classic examples of defensive deceptions, but not all tactics and strategies have analogies in cyberspace. Honeypots are the most important example today; they are decoy computer systems designed to encourage attacks to collect data about attack methods. We examine the opportunities for deception in honeypots, and then… CONTINUE READING
Highly Cited
This paper has 19 citations. REVIEW CITATIONS

From This Paper

Figures, tables, results, connections, and topics extracted from this paper.
11 Extracted Citations
18 Extracted References
Similar Papers

Citing Papers

Publications influenced by this paper.
Showing 1-10 of 11 extracted citations

Similar Papers

Loading similar papers…