Sorry! The requested paper could not be found.
Attacking Attackers
Featuring 10 Papers as of January 30, 2018
-
DNS: An Asset, Not a Liability Analyst Paper (requires membership in SANS.org community)
by Matt Bromiley - January 30, 2018- Associated Webcasts: DNS: An Asset, Not a Liability
- Sponsored By: Infoblox
The Domain Name System, or DNS, is crucial to billions of Internet users daily, but it comes with issues that organizations must be aware of. Attackers are abusing DNS to conduct attacks that bring businesses to their knees. Fortunately, with the right detection and analysis mechanisms in place, security teams can turn DNS vulnerabilities into enterprise assets.
-
Minerva Labs: Using Anti-Evasion to Block the Stealth Attacks Other Defenses Miss Analyst Paper (requires membership in SANS.org community)
by Eric Cole, PhD - December 4, 2017- Associated Webcasts: Using Anti-Evasion to Block Stealth Attacks with Minerva Labs
- Sponsored By: Minerva Labs
Attackers routinely use evasion to evade baseline anti-malware tools and ultimately compromise endpoints. How can enterprises prevent such intrusions without relying on after-the-fact detection? This paper explores a unique approach to preventing evasive malware from infecting endpoints, using Minerva's Anti-Evasion Platform to automatically block threats without ever scanning files or processes. SANS Reviewer Eric Cole, PhD, shares his findings regarding the ability of Minerva's Anti-Evasion Platform to block such evasive threats.
-
Catching Flies: A Guide to the Various Flavors of Honeypots SANS.edu Graduate Student Research
by Scott Smith - April 19, 2016While the concept of baiting adversaries in order to monitor their activities is nothing new, honeypotting has evolved into a critical tool in information security analysis. Recent years have given rise to advances in the detection of network intrusions such as honeynets, honeytokens and adaptive honeypots. This paper will explore modern applications, as well as the legal and technical considerations behind emerging honeypot solutions in the dynamic blockage of emerging attack vectors and the potential exploitation of advanced persistent threats.
-
Honeytokens and honeypots for web ID and IH SANS.edu Graduate Student Research
by Rich Graves - May 14, 2015Honeypots and honey tokens can be useful tools for examining follow-up to phishing attacks.
-
Home Field Advantage: Employing Active Detection Techniques by Benjamin Jackson - October 29, 2013
In sports, the term "home field advantage" is often discussed; the home team often knows all the quirks oddities of their "home field" due to constant practice on the same field day after day.
-
Implementing Active Defense Systems on Private Networks SANS.edu Graduate Student Research
by Josh Johnson - August 20, 2013As attacks become increasingly complex due to the sophistication, organization and motivation of adversaries, defensive strategies must mature in order to remain effective.
-
The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare SANS.edu Graduate Student Research
by Terrence OConnor - February 14, 2012We live in an era where a single soldier can digitally leak thousands of classified documents (possibly changing the course of war), attackers can compromise unmanned drone control software and intercept unencrypted video feeds, and recreational hackers can steal and release personal information from members of cyber think-tanks.
-
LaBrea - A New Approach to Securing Our Networks by Leigh Haig - March 7, 2002
An examination of how Code Red could defeat existing security mechanisms, what benefit the tool LaBrea could offer, the history and technology behind this application, the networking fundamentals that allow it to work, and a look at the failings of other defenses within existing security solutions.
-
Honey Pots and Honey Nets - Security through Deception by William Martin - May 21, 2001
A discussion on the security tool and concept known as a Honey Pot and Honeynet.
-
Anti-Hacking: The Protection of Computers by Chadd Schlotter - April 2, 2001
The three aspects discussed in this paper: Education of the Security Adminis trator, Securing the Environment, and How to Fight Back are just one combined definition of how to protect a system against hacking.
Most of the computer security white papers in the Reading Room have been written by students seeking GIAC certification to fulfill part of their certification requirements and are provided by SANS as a resource to benefit the security community at large. SANS attempts to ensure the accuracy of information, but papers are published "as is". Errors or inconsistencies may exist or may be introduced over time as material becomes dated. If you suspect a serious error, please contact webmaster@sans.org.
All papers are copyrighted. No re-posting or distribution of papers is permitted.
SANS.edu Graduate Student Research - This paper was created by a SANS Technology Institute student as part of the graduate program curriculum.

