Active Defense via a Labyrinth of Deception

A network baseline allows for the identification of malicious activity in real time. However, a baseline requires that every listed action is known and accounted, presenting a nearly impossible task in any production environment due to an ever-changing application footprint, system and application...
By
Nathaniel Quist
December 5, 2016

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg