Saturday, January 23, 00:39
Home security DEEP-Dig: The method by which researchers deceive hackers!

DEEP-Dig: The method by which researchers deceive hackers!

DEEP-Dig University of TexasIn the annual Congress In December 2019 in Puerto Rico as well as at the International Conference on Systems Science in Hawaii, researchers from the University of Texas presented to computer scientists and researchers information technology in Dallas their new project. This is a tactic for gathering information from hackers that can later be used against them. This is a rapidly growing field of cyber security and is known as “technology deception ”. This cunning and insidious approach enables those who work in the field cyber security observe hacking attacks from a different angle. The DEEP-Dig (DEcEPtion DIGging) method "deceives" hackers through a fraud site designed to track down suspicious and insidious activities. This information is then fed to one computer, where they are analyzed to illustrate how to identify and prevent future ones hacking attacks.

Ο Dr. Kevin Hamlen, Eugene McDermott Professor of Informatics said there are criminals who are constantly trying to attack various networks and this is usually evaluated as something negative. He also pointed out that instead of looking for ways to prevent hackers, they might have to be treated as freelancers who provide data on what the hackers look like. malicious attacks. Therefore, they are a free source of high value data.hacker site fraud

However, there are restrictions on their protection personal data make it difficult for researchers to gain sufficient information about hackers' tactics, so it is not easy to devise effective defensive strategies to counter or even avoid them. The DEEP-Dig method works like a spy in the hacker's camp, gathering valuable information in real time about how a hacker attacks.

Dr. Gbadebo Ayoade, who presented the findings to scientists in Puerto Rico and Hawaii, said that gathering more evidence could make it easier to identify and detect an attack. Specifically, scientists use the data they collect from hackers to train the machine so that it can detect an attack, while using the deception tactic they will be able to gather more data better.

Dr. Latifur Khan, a computer science professor at UT Dallas, said hackers will feel they have succeeded when they meet the website fraud equipped with data misinformation and misleading. Finally, he said that identifying the deception technique used by a cybercriminal and using it against him to get into his activity in some way is essentially a way of turning roles into an endless one. game.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

LIVE NEWS

Intel CPUs Review: Core i7-10700 vs Core i7-10700K!

Over the years, the Intel series of processors (CPUs) introduced the series of overclocking models "K" and more recently the series ...

The DeLorean can return as an electric car

The DMC DeLorean has been out of production for almost 40 years, but it looks like the iconic vehicle will return as an electric car.

Windows RDP servers are used to support DDoS

Cybercrime gangs are abusing Windows Remote Desktop Protocol (RDP) systems to reinforce the unwanted ...

SEPA: He refused to pay a ransom and thousands of files were leaked

Thousands of stolen files of the Scottish Environmental Protection Agency (SEPA) have been published by hackers, after the organization refused to pay the ransom ...

Fines at Valve, Capcom and Zenimax for geo-exclusion of games

Following a European Commission investigation, a group of video game publishers was fined € 7,8 million following allegations of geo-exclusion practices. In...

Bitcoin helps the middle class survive the pandemic

Regulators still imply that Bitcoin is just a tool for criminals, but it seems that for the middle class ...

Lightworks 2021.1 for Linux, Mac and Windows has been released

Lightworks Professional Multi-Platform Video Editing Software received the first major update to Lightworks 2021.1 for Windows, Linux and Mac.

Netflix: Watch the 9 best Anime movies of all time

One of the good things about the pandemic was that many people were introduced to the anime world. And the issue with anime is ...

CHwapi: Windows BitLocker "hit" the Belgian hospital!

The CHwapi hospital in Belgium was attacked by a cyber attack on January 17, with hackers claiming to have encrypted 40 servers and 100 ...

CPU / GPU Lotteries: Newegg sells the few on the market

Hardware shortages are not uncommon, but the pandemic has worsened the situation. The whole planet is closed to ...