Dan “Rags” RagsdaleProgram Manager, Information Innovation Office           Scalable Cyber Deception                DARPA ...
Deception in Warfare                                            “All warfare is based on                                  ...
Intrusion attempts on a Government agency• 40,000 blocked intrusion attempts/week• World-wide attack sources              ...
An Example Architecture for Cyber Deception           Approved for Public Release, Distribution Unlimited.
Scalable Cyber Deception IssuesGeneration and Deployment of both Decoy Products andInfrastructure  •   Automated  •   Real...
Key Technical Challenge       To significantly increase adversaries’ workloads              with minimal increase to our o...
Scalable and Tailorable Cyber Deception       Please send input to:       Daniel.Ragsdale@darpa.mil           Approved for...
Upcoming SlideShare
Loading in …5
×

Scalable Cyber Deception (Ragsdale)

1,015
-1

Published on

Presentation from the Colloquium on Future Directions in Cyber Security on Nov 7, 2011.

Published in: Technology, Design
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,015
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Scalable Cyber Deception (Ragsdale)

  1. 1. Dan “Rags” RagsdaleProgram Manager, Information Innovation Office Scalable Cyber Deception DARPA Cyber Colloquium Arlington, VA November 7, 2011 Approved for Public Release, Distribution Unlimited.
  2. 2. Deception in Warfare “All warfare is based on deception…” Sun Tzuhttp://www.ng.mil/Images1/today/0501b.jpg Deception: A direct counter to asymmetrical threats Approved for Public Release, Distribution Unlimited.
  3. 3. Intrusion attempts on a Government agency• 40,000 blocked intrusion attempts/week• World-wide attack sources An Opportunity? Approved for Public Release, Distribution Unlimited.
  4. 4. An Example Architecture for Cyber Deception Approved for Public Release, Distribution Unlimited.
  5. 5. Scalable Cyber Deception IssuesGeneration and Deployment of both Decoy Products andInfrastructure • Automated • Realistic, Credible, Enticing • Tailorable • Differentiable / Non-differentiable • Noninterference Approved for Public Release, Distribution Unlimited.
  6. 6. Key Technical Challenge To significantly increase adversaries’ workloads with minimal increase to our ownPromising Applicable Research Areas: • Natural Language Processing • Large-scale Virtualization • Realistic Synthetic Activity Generation • Protocol Manipulation and Exploitation • Behavioral Science • Others… Approved for Public Release, Distribution Unlimited.
  7. 7. Scalable and Tailorable Cyber Deception Please send input to: Daniel.Ragsdale@darpa.mil Approved for Public Release, Distribution Unlimited.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×