Featuring 6 Papers as of December 4, 2013
Home Field Advantage: Employing Active Detection Techniques
by Benjamin Jackson - October 29, 2013
In sports, the term "home field advantage" is often discussed; the home team often knows all the quirks oddities of their "home field" due to constant practice on the same field day after day.
Implementing Active Defense Systems on Private Networks
by Josh Johnson - August 20, 2013
As attacks become increasingly complex due to the sophistication, organization and motivation of adversaries, defensive strategies must mature in order to remain effective.
The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare
by Terrence OConnor - February 14, 2012
We live in an era where a single soldier can digitally leak thousands of classified documents (possibly changing the course of war), attackers can compromise unmanned drone control software and intercept unencrypted video feeds, and recreational hackers can steal and release personal information from members of cyber think-tanks.
LaBrea - A New Approach to Securing Our Networks
by Leigh Haig - March 7, 2002
An examination of how Code Red could defeat existing security mechanisms, what benefit the tool LaBrea could offer, the history and technology behind this application, the networking fundamentals that allow it to work, and a look at the failings of other defenses within existing security solutions.
Honey Pots and Honey Nets - Security through Deception
by William Martin - May 21, 2001
A discussion on the security tool and concept known as a Honey Pot and Honeynet.
Anti-Hacking: The Protection of Computers
by Chadd Schlotter - April 2, 2001
The three aspects discussed in this paper: Education of the Security Adminis trator, Securing the Environment, and How to Fight Back are just one combined definition of how to protect a system against hacking.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact email@example.com.
All papers are copyrighted. No re-posting or distribution of papers is permitted.