Cyber Deception by Sushil Jajodia V.S. Subrahmanian Vipin Swarup & Cliff Wang

Cyber Deception by Sushil Jajodia V.S. Subrahmanian Vipin Swarup & Cliff Wang

Author:Sushil Jajodia, V.S. Subrahmanian, Vipin Swarup & Cliff Wang
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham


Duplicate Attacks A duplicate attack occurs when the same team uses the same payload to attack a team at different time instances. Duplicate attacks can be attributed to two reasons. First when a team is trying to compromise other system, it just does not launch a single attack but a wave of attacks with very little time difference between consecutive attacks. Second, once a successful payload is created which can penetrate the defense of other systems, it is used more by the original attacker as well as the deceptive one as compared to other payloads. We group duplicates as being non-deceptive and deceptive. Non-deceptive duplicate are the duplicates of the team that first initiated the use of a particular payload. On the other hand deceptive duplicates are all the attacks from the teams that are being deceptive. Deceptive duplicates form a large portion of the dataset as seen in Fig. 2.

Fig. 2Total attacks and duplicate attacks (Deceptive and Non-deceptive) directed towards each team



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.