Using deception for assuring security

Stilianos Vidalis, Eric Llewellyn, Christopher Tubb

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

For each layer of information security there are a number of techniques and tools that can be used to ensure information superiority. Indeed some experts would argue that you can not have the former without the later. In today's technological & interconnected world though, information superiority is very hard to achieve and almost impossible to maintain. This paper will argue that the art of deception is a reliable and effective technique that can ensure and maintain the security of an infrastructure. The paper will conclude by presenting a technical solution of the above statement.

Original languageEnglish
Title of host publicationICIW 2007: 2nd International Conference on i-Warfare and Security, 8-9 March 2007
EditorsLeigh Armistead
Place of PublicationUK
PublisherAcademic Conferences International (ACI)
Pages233-240
Number of pages8
ISBN (Print)978-1-905305-41-4
Publication statusPublished - 8 Mar 2007
Event2nd International Conference on i-Warfare and Security, ICIW 2007 - Monterey, CA, United States
Duration: 8 Mar 20079 Mar 2007

Conference

Conference2nd International Conference on i-Warfare and Security, ICIW 2007
Country/TerritoryUnited States
CityMonterey, CA
Period8/03/079/03/07

Keywords

  • Deception
  • Information security
  • Information superiority
  • Virtual honeypots

Fingerprint

Dive into the research topics of 'Using deception for assuring security'. Together they form a unique fingerprint.

Cite this