False Positives: False positive response

  • Authors:
  • Siraj A. Shaikh;Howard Chivers;Philip Nobles;John A. Clark;Hao Chen

  • Affiliations:
  • Department of Informatics and Sensors, Cranfield University, UK;Department of Informatics and Sensors, Cranfield University, UK;Department of Informatics and Sensors, Cranfield University, UK;Department of Computer Science, University of York, UK;Department of Computer Science, University of York, UK

  • Venue:
  • Network Security
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

In an earlier article we examined reconnaissance activity over networks and discussed some of the challenges in detecting such behaviour.^1 One approach to dealing with such activity is false positive response.^2 The purpose of false positive response is to make it difficult for an intruder to distinguish between the operational active address space and the inactive one, and between genuine and decoy hosts. Such an approach is designed to render any reconnaissance information useless and make it difficult to obtain accurate information about a potential target network.