| Table of ContentsControlling Large-Scale Deceptions Disclaimer Fred Cohen Outline The Great Wall The Maginot Line Iraq’s dug in armies Why military defenses fail Cyber-defenses  How Cyber-Defenses Fail How Cyber-Defenses Fail How Cyber-Defenses Fail How Cyber-Defenses Fail How Cyber-Defenses Fail How Cyber-Defenses Fail Why cyber defenses fail Deception: A Tool for Cyber Warfare Deception as a Defense PPT Slide Deceptive Defense Examples Deceptive Defense Examples Deceptive Defense Examples Deceptive Defense Deceptive Defense Properties Other Honey Pot Systems The Original Deception ToolKit Deception Toolkit Example A DTK Session The view from inside Other DTK actions New Innovation #1 - Patent PendingMultiple Deceptions in One BoxEven though it looks like a lot of deception boxesthey all operate in a single PC and appear to be different PPT Slide PPT Slide New Innovation # 2 - Patent PendingMultiple Address TranslationsAddresses are translated multiple times to allow deception networks to be separated from normal networks, to allow ‘real’ machines to replace low fidelity deceptions, and to allow increased indirection & obscurity What the Student Sees The Reality A Larger Scale Example - Patent PendingThis example is operating in a Class Bnetwork and emulates up to 40,000 systems The Second Practical Use A Distributed Computing Example - Pat. Pend. Two Translation Designs - Pat. Pend. Another Application - LEAN: A Minor Problem Fancy automated system design Fancy automated stuff II Terminology Fancy Stuff III Stuff 4 Controlling LEAN PPT Slide Conclusions Questions / Discussion? |