Introduction to Cyberdeception by Neil C. Rowe & Julian Rrushi
Author:Neil C. Rowe & Julian Rrushi
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
11.8.3 Metadata of Typical File Systems
We have been studying a collection of 4265 drives containing 251.7 million files obtained from various sources around the world (Rowe 2016). The term “drive” means something intended for secondary storage, primarily magnetic disks and flash memories. Our collection (or “corpus”) includes drives purchased as used equipment in 32 countries around the world, a selection of classroom and laboratory computers at NPS, and some miscellaneous contributions. This data provides the basis for a good model of a realistic honeypot.
Table 11.3 shows the percentages of file types for five sets from our 2015 data: The full set of files, the Windows computers after eliminating of common operating-system and software files, the mobile devices similarly reduced, the storage devices (like thumb drives) similarly reduced, and the drives having other operating systems (including Linux machines, Macintosh machines, digital cameras, auxiliary memory cards, and printers) similarly reduced. The reduction process eliminated common software files and involved nine different clues. There were a total of 251.7 million files for the first set, 58.8 million on 1819 drives for the Windows set, 6.5 million on 374 drives for the mobile-device set, 1.1 million on 350 drives for the storage-device set, and 0.5 million on 693 drives for the other-operating-system set. That meant the average Windows drive had 32,325 files, the average mobile device had 17,271 files, the average storage device had 3,267 files, and the average other operating system had 665 files. Note that useful honeypots can be mobile devices and storage devices too. This data gives guidelines for how to allocate files by type for a good honeypot. Surprisingly, there is not much published data of this type, though Douceur and Bolosky (1999) and Pang et al. (2004) are a start.Table 11.3File-type distributions for drives in our corpus
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7742)
Grails in Action by Glen Smith Peter Ledbrook(7664)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6239)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6198)
Running Windows Containers on AWS by Marcio Morales(5720)
Kotlin in Action by Dmitry Jemerov(5016)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4733)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4392)
Combating Crime on the Dark Web by Nearchos Nearchou(4321)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(3989)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(3985)
The Age of Surveillance Capitalism by Shoshana Zuboff(3910)
Python for Security and Networking - Third Edition by José Manuel Ortega(3545)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3487)
Mastering Python for Networking and Security by José Manuel Ortega(3317)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3307)
Blockchain Basics by Daniel Drescher(3271)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3224)
TCP IP by Todd Lammle(2956)
