Featuring 6 Papers as of December 4, 2013
Home Field Advantage: Employing Active Detection Techniques
Benjamin Jackson - December 4, 2013
In sports, the term "home field advantage" is often discussed; the home team often knows all the quirks oddities of their "home field" due to constant practice on the same field day after day.
Implementing Active Defense Systems on Private Networks Masters
Josh Johnson - August 20, 2013
As attacks become increasingly complex due to the sophistication, organization and motivation of adversaries, defensive strategies must mature in order to remain effective.
The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare Masters
Terrence OConnor - February 14, 2012
We live in an era where a single soldier can digitally leak thousands of classified documents (possibly changing the course of war), attackers can compromise unmanned drone control software and intercept unencrypted video feeds, and recreational hackers can steal and release personal information from members of cyber think-tanks.
LaBrea - A New Approach to Securing Our Networks
Leigh Haig - October 31, 2003
An examination of how Code Red could defeat existing security mechanisms, what benefit the tool LaBrea could offer, the history and technology behind this application, the networking fundamentals that allow it to work, and a look at the failings of other defenses within existing security solutions.
Anti-Hacking: The Protection of Computers
Chadd Schlotter - October 31, 2003
The three aspects discussed in this paper: Education of the Security Adminis trator, Securing the Environment, and How to Fight Back are just one combined definition of how to protect a system against hacking.
Honey Pots and Honey Nets - Security through Deception
William Martin - October 31, 2003
A discussion on the security tool and concept known as a Honey Pot and Honeynet.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact email@example.com.
All papers are copyrighted. No re-posting or distribution of papers is permitted.