The Second Practical Use
24.1.84.100
Deception
204.7.229.1
Attacker
10.0.0.4
IDS
10.0.0.2
204.7.229.16
Deception
10.0.0.1
Defender
10.0.0.3
204.7.229.32
Deception
From IP
Other
Systems
24.1.84.100
and
10.0.0.1
Deception
Target
10.0.0.2
The attacker thinks
they are getting into
24.1.84.100 but they
are really only getting
into a deception network
The university students
operate under another
deception within the
same network - enabled
by multiple translation
Pat. Pend.
Previous slide
Next slide
Back to first slide
View graphic version