Cyber Deception by Sushil Jajodia V.S. Subrahmanian Vipin Swarup & Cliff Wang
Author:Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup & Cliff Wang
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
Duplicate Attacks A duplicate attack occurs when the same team uses the same payload to attack a team at different time instances. Duplicate attacks can be attributed to two reasons. First when a team is trying to compromise other system, it just does not launch a single attack but a wave of attacks with very little time difference between consecutive attacks. Second, once a successful payload is created which can penetrate the defense of other systems, it is used more by the original attacker as well as the deceptive one as compared to other payloads. We group duplicates as being non-deceptive and deceptive. Non-deceptive duplicate are the duplicates of the team that first initiated the use of a particular payload. On the other hand deceptive duplicates are all the attacks from the teams that are being deceptive. Deceptive duplicates form a large portion of the dataset as seen in Fig. 2.
Fig. 2Total attacks and duplicate attacks (Deceptive and Non-deceptive) directed towards each team
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7797)
Grails in Action by Glen Smith Peter Ledbrook(7708)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6712)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6711)
Running Windows Containers on AWS by Marcio Morales(6226)
Kotlin in Action by Dmitry Jemerov(5077)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4993)
Combating Crime on the Dark Web by Nearchos Nearchou(4580)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4488)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4429)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4252)
The Age of Surveillance Capitalism by Shoshana Zuboff(3967)
Python for Security and Networking - Third Edition by José Manuel Ortega(3820)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3518)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3488)
Learn Wireshark by Lisa Bock(3403)
Mastering Python for Networking and Security by José Manuel Ortega(3365)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Blockchain Basics by Daniel Drescher(3310)
