Skip to main content

Showing 1–2 of 2 results for author: Anjum, I

.
  1. arXiv:2008.02979  [pdf, ps, other

    cs.CR

    Role-Based Deception in Enterprise Networks

    Authors: Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar Singh

    Abstract: Historically, enterprise network reconnaissance is an active process, often involving port scanning. However, as routers and switches become more complex, they also become more susceptible to compromise. From this vantage point, an attacker can passively identify high-value hosts such as the workstations of IT administrators, C-suite executives, and finance personnel. The goal of this paper is to… ▽ More

    Submitted 6 August, 2020; originally announced August 2020.

    Comments: 15 pages, 7 Figures, coference

  2. arXiv:2002.09069  [pdf, other

    cs.CR cs.GT

    Optimizing Vulnerability-Driven Honey Traffic Using Game Theory

    Authors: Iffat Anjum, Mohammad Sujan Miah, Mu Zhu, Nazia Sharmin, Christopher Kiekintveld, William Enck, Munindar P Singh

    Abstract: Enterprises are increasingly concerned about adversaries that slowly and deliberately exploit resources over the course of months or even years. A key step in this kill chain is network reconnaissance, which has historically been active (e.g., network scans) and therefore detectable. However, new networking technology increases the possibility of passive network reconnaissance, which will be large… ▽ More

    Submitted 20 February, 2020; originally announced February 2020.

    Journal ref: AAAI Workshop on Artificial Intelligence for Cyber Security (AICS), 2020