A method and apparatus is disclosed for increasing the security of computer networks through the use of an Intrusion and Misuse Deterrence
System (IMDS) operating on the network. The IMDS is a
system that creates a synthetic network complete with synthetic hosts and routers. It is comprised of a network
server with associated
application software that appears to be a legitimate portion of a real network to a network intruder. The IMDS consequently invites inquiry and entices the intruder away from the real network. Simulated services are configured to appear to be running on virtual clients with globally unique, class “C” IP addresses. Since there are no legitimate users of the
virtual network simulated by the IMDS, all such activity must be inappropriate and can be treated as such. Consequently, the entire set of transactions by an intruder can be collected and identified rather than just those transactions that meet a predefined
attack profile. Also, new exploits and attacks are handled just as effectively as known attacks, resulting in better identification of
attack methodologies as well as the identification and analysis of new
attack types. Since the IMDS only has to be concerned with the traffic going to its simulated hosts it additionally eliminates the
bandwidth limitation that plagues a traditional
intrusion detection system (IDS).