Page 5

 
Previous Page                                                                         

Next Page



attacking files. It did not stop the system’s defenses from fighting the intruder, but, it created a second front with an alternative approach and, thus, bolstered the defense mechanism of that system.

My new method was based on the concept of leaving digital “BUOYS” on major networks and channels at various strategic points. By strategic locations I mean certain access channels that any intruder would need to pass through in order to take control or simply to enter. Think of it as a multistory building with a gate at every level and with several apartments at each level with each apartment having several doors for each room. Thus, to reach a particular room in that building, a person would need to pass through several doors to reach the floor where the room is, and, then, through the door of that particular apartment, and, finally, through the door of that room. In the same way, any intruder into a network has to pass through certain access points, and, those were the locations that I picked to plant my “BUOYS”. Those “BUOYS” were designed to send out an alert to me about any attempt at an intrusion into that network or any part of that network. Simultaneously, they used to alert the network administrators about the intrusion. I called them “BUOYS” not only because they used to alert me in case of intrusions like the ones used at sea as markers, but, also because I had built a floating mechanism in them like the ones used at sea. They would hide themselves in a file and in case a system’s defense mechanism initiated any scan to locate the infected file, the “BUOY” would detach itself from that file and would keep hopping from file to file and if the number of scanned files got much larger than the ones still pending to be scanned, it would jump to one of



Previous Page                                                                                   

Next Page