Computer hackers could be thwarted by new ‘deception consistency’ method

Science Daily  November 28, 2018
When the attackers are trapped, they can only make observations that are consistent with what they have seen already so that they cannot recognize the deceptive environment. Researchers at NYSU at Binghamton used logic constraints to characterize an attacker’s best knowledge (either positive, negative, or uncertain). When migrating the attacker’s FTP connection into a contained environment, they use these logic constraints to instantiate a new FTP file system that is guaranteed free of inconsistency. In tests, they found that the participants’ chances of recognizing deceptive environments are close to random guesses. The technique may not hold up against more advanced attacks, but it is effective against a variety of attack scenarios…read more. TECHNICAL ARTICLE

Posted in Cyber security.

Leave a Reply