Controlling Large-Scale Deceptions

6/12/00


Click here to start


Table of Contents

Controlling Large-Scale Deceptions

Disclaimer

Fred Cohen

Outline

The Great Wall

The Maginot Line

Iraq’s dug in armies

Why military defenses fail

Cyber-defenses

How Cyber-Defenses Fail

How Cyber-Defenses Fail

How Cyber-Defenses Fail

How Cyber-Defenses Fail

How Cyber-Defenses Fail

How Cyber-Defenses Fail

Why cyber defenses fail

Deception: A Tool for Cyber Warfare

Deception as a Defense

PPT Slide

Deceptive Defense Examples

Deceptive Defense Examples

Deceptive Defense Examples

Deceptive Defense

Deceptive Defense Properties

Other Honey Pot Systems

The Original Deception ToolKit

Deception Toolkit Example

A DTK Session

The view from inside

Other DTK actions

New Innovation #1 - Patent Pending Multiple Deceptions in One Box Even though it looks like a lot of deception boxes they all operate in a single PC and appear to be different

PPT Slide

PPT Slide

New Innovation # 2 - Patent Pending Multiple Address Translations Addresses are translated multiple times to allow deception networks to be separated from normal networks, to allow ‘real’ machines to replace low fidelity deceptions, and to allow increased indirection & obscurity

What the Student Sees

The Reality

A Larger Scale Example - Patent Pending This example is operating in a Class B network and emulates up to 40,000 systems

The Second Practical Use

A Distributed Computing Example - Pat. Pend.

Two Translation Designs - Pat. Pend.

Another Application - LEAN:

A Minor Problem

Fancy automated system design

Fancy automated stuff II

Terminology

Fancy Stuff III

Stuff 4

Controlling LEAN

PPT Slide

Conclusions

Questions / Discussion?

Author: User3