Intelligent Software Decoys
نویسندگان
چکیده
We introduce an abstraction known as an intelligent software decoy for protecting objects within a component-based architecture from egregious and malicious use by mobile agents. If an agent misuses or tries to circumvent the published interface specification of an object, then the object switches from its nominal operating mode to a deception mode. While serving as a decoy, an object attempts to both deceive the agent into concluding that its violation of the interface specification has been successful and assess the nature of the violation. The interface specification is treated as a contract consisting of preconditions, postconditions, and a class invariant. Failure of a precondition triggers the transition between modes. An intelligent software decoy is adaptable, autarkic, polymorphic, and self-replicating. The decoy disguises and defends itself by modifying its contract at run-time through the use of both polymorphism and late binding. The nature and extent of any change to an object is governed by its class invariant.
منابع مشابه
Software Decoys : Intrusion Detection and Countermeasures
—We introduce the notion of an intelligent software decoy, and provide both an architecture and event-based language for automatic implementation of them. Our decoys detect and respond to patterns of suspicious behavior, and maintain a repository of rules for behavior patterns and decoying actions. As an example, we construct a model of system behavior from an initial list of event types and th...
متن کاملDiscrimination Options in the Near Term
Estimating midcourse threats and deriving optimal numbers of decoys produces an integrated picture of the trades between boost-phase attrition, midcourse defenses, and discrimination. Boost and midcourse interceptors can be effective, but are sensitive to light decoys. If discrimination is not available at the outset of deployment, enough interceptors must be purchased to meet both the RVs and ...
متن کاملDecoyFinder: an easy-to-use python GUI application for building target-specific decoy sets
UNLABELLED Decoys are molecules that are presumed to be inactive against a target (i.e. will not likely bind to the target) and are used to validate the performance of molecular docking or a virtual screening workflow. The Directory of Useful Decoys database (http://dud.docking.org/) provides a free directory of decoys for use in virtual screening, though it only contains a limited set of decoy...
متن کاملGranular clustering of de novo protein models
MOTIVATION Modern algorithms for de novo prediction of protein structures typically output multiple full-length models (decoys) rather than a single solution. Subsequent clustering of such decoys is used both to gauge the success of the modelling and to decide on the most native-like conformation. At the same time, partial protein models are sufficient for some applications such as crystallogra...
متن کاملEffectiveness of Spinning-Wing Decoys Varies Among Dabbling Duck Species and Locations
Spinning-wing decoys are strong attractants to ducks and increase kill rates over traditional decoying methods. However, it is unknown whether all duck species are attracted similarly to spinning-wing decoys and whether the effectiveness of these decoys changes with latitude. We examined the effectiveness of spinning-wing decoys for 9 species of dabbling ducks during 545 experimental hunts in C...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001