Engaging the Adversary as a Viable Response to Network Intrusion


The criticality of cyber infrastructure makes it a very attractive target, which we try to protect by building perimeter defences. This paper argues that a reactive-oriented network defence policy based solely on perimeter defences is not sufficient to properly safeguard IT infrastructure. An argument is made for an approach based on the idea that defence… (More)

2 Figures and Tables


  • Presentations referencing similar topics