It’s the week before Labor Day, and for most of folks in the U.S. that means the end of summer is approaching. But for many of us involved with the data center, it means another exciting virtualization confab is underway in San Francisco with VMwor…
The US Air Force is focusing on cyber deception next year: Background: Deception is a deliberate act to conceal activity on our networks, create uncertainty and confusion against the adversary’s efforts to establish situational awareness and to influence and misdirect adversary perceptions and decision processes. Military deception is defined as “those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission.” Military forces have historically used techniques such as camouflage, feints, chaff, jammers, fake equipment, false messages or traffic to alter an enemy’s perception of reality. Modern day military planners need a capability that goes beyond the current state-of-the-art in cyber deception to provide a system or systems that can be employed by a commander when needed to enable deception to be inserted into defensive cyber operations.
InÂ aÂ previous post, Monitoring Windows Networks Using Syslog, I discussed using syslog to send the event logs to a SIEM. Â This post covers another technique for collecting event log data for analysis