Abstract
Decoy or fake I/O devices can thwart malware attacks by incorporating diversity, misdirection, and confusion into an operating system, while preserving system usability and manageability. The idea is to display on a computer system evidence of the decoy I/O devices following Chap. 7 ideas. Their projection would make them appear as valid targets of interception and malicious modification, or as means of propagation to target machines. Good candidates for decoy I/O devices could be:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kujawa A (2012) DarkComet. Available at blog.malwarebytes.org/intelligence/2012/06/you-dirty-rat-part-1-darkcomet
Ornaghi A, Valleri M (2015) Ettercap., Available at ettercap.github.io/ettercap/ index.html
Reeves R (2010) Windows 7 device driver. Addison-Wesley Professional, Upper Saddle River, NJ
Rrushi J (2016) NIC displays to thwart malware attacks mounted from within the OS. Computers & Security 61:59–71
Song D (2000) Dsniff., Available online at, www.monkey.org/~dugsong/dsniff
Szor P (2005) The art of computer virus research and defense. Addison Wesley, North Saddle River, NJ
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rowe, N.C., Rrushi, J. (2016). Decoy I/O Devices. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-41187-3_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41185-9
Online ISBN: 978-3-319-41187-3
eBook Packages: Computer ScienceComputer Science (R0)