2010 Articles
Automating the Injection of Believable Decoys to Detect Snooping
We propose a novel trap-based architecture for enterprise networks that detects "silent" attackers who are eavesdropping network traffic. The primary contributions of our work are the ease of injecting, automatically, large amounts of believable bait, and the integration of various detection mechanisms in the back-end. We demonstrate our methodology in a prototype platform that uses our decoy injection API to dynamically create and dispense network traps on a subset of our campus wireless network. Finally, we present results of a user study that demonstrates the believability of our automatically generated decoy traffic.
Subjects
Files
- bowen-wisec034b.pdf application/pdf 211 KB Download File
Also Published In
- Title
- WiSec'10: Proceedings of the Third ACM Conference on Wireless Network Security: Hoboken, New Jersey, March 22-24, 2010
- Publisher
- Association for Computing Machinery
- DOI
- https://doi.org/10.1145/1741866.1741880
More About This Work
- Academic Units
- Computer Science
- Published Here
- August 9, 2011