Leading attackers through attack graphs with deceptions
暂无分享,去创建一个
This paper describes a series of experiments in which specific deceptions were created in order to induce red teams attacking computer networks to attack network elements in sequence. It demonstrates the ability to control the path of an attacker through the use of deceptions and allows us to associate metrics with paths and their traversal.
[1] Fred Cohen,et al. A Framework for Deception , 2001 .