Skip to main content

Showing 1–2 of 2 results for author: Elzer, K

.
  1. Evaluating Deception and Moving Target Defense with Network Attack Simulation

    Authors: Daniel Reti, Karina Elzer, Daniel Fraunholz, Daniel Schneider, Hans-Dieter Schotten

    Abstract: In the field of network security, with the ongoing arms race between attackers, seeking new vulnerabilities to bypass defense mechanisms and defenders reinforcing their prevention, detection and response strategies, the novel concept of cyber deception has emerged. Starting from the well-known example of honeypots, many other deception strategies have been developed such as honeytokens and moving… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

  2. arXiv:2301.10502  [pdf, other

    cs.CR

    SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and Obfuscation

    Authors: Daniel Reti, Karina Elzer, Hans Dieter Schotten

    Abstract: Every attack begins with gathering information about the target. The entry point for network breaches are often vulnerabilities in internet facing websites, which often rely on an off-the-shelf Content Management System (CMS). Bot networks and human attackers alike rely on automated scanners to gather information about the CMS software installed and potential vulnerabilities. To increase the secur… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

    Comments: 8 pages, 1 figure, 2 tables, ICISSP 2023 https://icissp.scitevents.org/