Intelligent Software Decoys

نویسندگان

  • James Bret
  • Richard D. Riehle
چکیده

We introduce an abstraction known as an intelligent software decoy for protecting objects within a component-based architecture from egregious and malicious use by mobile agents. If an agent misuses or tries to circumvent the published interface specification of an object, then the object switches from its nominal operating mode to a deception mode. While serving as a decoy, an object attempts to both deceive the agent into concluding that its violation of the interface specification has been successful and assess the nature of the violation. The interface specification is treated as a contract consisting of preconditions, postconditions, and a class invariant. Failure of a precondition triggers the transition between modes. An intelligent software decoy is adaptable, autarkic, polymorphic, and self-replicating. The decoy disguises and defends itself by modifying its contract at run-time through the use of both polymorphism and late binding. The nature and extent of any change to an object is governed by its class invariant.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Software Decoys : Intrusion Detection and Countermeasures

—We introduce the notion of an intelligent software decoy, and provide both an architecture and event-based language for automatic implementation of them. Our decoys detect and respond to patterns of suspicious behavior, and maintain a repository of rules for behavior patterns and decoying actions. As an example, we construct a model of system behavior from an initial list of event types and th...

متن کامل

Discrimination Options in the Near Term

Estimating midcourse threats and deriving optimal numbers of decoys produces an integrated picture of the trades between boost-phase attrition, midcourse defenses, and discrimination. Boost and midcourse interceptors can be effective, but are sensitive to light decoys. If discrimination is not available at the outset of deployment, enough interceptors must be purchased to meet both the RVs and ...

متن کامل

DecoyFinder: an easy-to-use python GUI application for building target-specific decoy sets

UNLABELLED Decoys are molecules that are presumed to be inactive against a target (i.e. will not likely bind to the target) and are used to validate the performance of molecular docking or a virtual screening workflow. The Directory of Useful Decoys database (http://dud.docking.org/) provides a free directory of decoys for use in virtual screening, though it only contains a limited set of decoy...

متن کامل

Granular clustering of de novo protein models

MOTIVATION Modern algorithms for de novo prediction of protein structures typically output multiple full-length models (decoys) rather than a single solution. Subsequent clustering of such decoys is used both to gauge the success of the modelling and to decide on the most native-like conformation. At the same time, partial protein models are sufficient for some applications such as crystallogra...

متن کامل

Effectiveness of Spinning-Wing Decoys Varies Among Dabbling Duck Species and Locations

Spinning-wing decoys are strong attractants to ducks and increase kill rates over traditional decoying methods. However, it is unknown whether all duck species are attracted similarly to spinning-wing decoys and whether the effectiveness of these decoys changes with latitude. We examined the effectiveness of spinning-wing decoys for 9 species of dabbling ducks during 545 experimental hunts in C...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001