Abstract | ||
---|---|---|
Malicious attackers often scan nodes in a network in order to identify vulnerabilities that they may exploit as they traverse the network. In this paper, we propose that the system generates a mix of true and false answers in response to scan requests. If the attacker believes that all scan results are true, then he will be on a wrong path. If he believes some scan results are faked, he would have... |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/TIFS.2017.2710945 | IEEE Transactions on Information Forensics and Security |
Keywords | Field | DocType |
Software packages,Probabilistic logic,Semantics,Browsers,Web servers,Syntactics | Data mining,Deception,Heuristic (computer science),Computer science,Network security,Exploit,Theoretical computer science,Probabilistic logic,Semantics,Web server,Traverse | Journal |
Volume | Issue | ISSN |
12 | 11 | 1556-6013 |
Citations | PageRank | References |
5 | 0.64 | 22 |
Authors | ||
7 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sushil Jajodia | 1 | 9375 | 1839.16 |
Noseong Park | 2 | 50 | 21.54 |
Fabio Pierazzi | 3 | 50 | 6.02 |
A. Pugliese | 4 | 115 | 12.90 |
Edoardo Serra | 5 | 66 | 10.23 |
Gerardo I. Simari | 6 | 367 | 40.41 |
V. S. Subrahmanian | 7 | 6864 | 1053.38 |