A method and apparatus is disclosed for increasing the security of
computer networks through the use of an Intrusion and Misuse Deterrence
System (IMDS) operating on the network. The IMDS is a system that creates
a synthetic network complete with synthetic hosts and routers. It is
comprised of a network server with associated application software that
appears to be a legitimate portion of a real network to a network
intruder. The IMDS consequently invites inquiry and entices the intruder
away from the real network. Simulated services are configured to appear
to be running on virtual clients with globally unique, class "C" IP
addresses. Since there are no legitimate users of the virtual network
simulated by the IMDS, all such activity must be inappropriate and can be
treated as such. Consequently, the entire set of transactions by an
intruder can be collected and identified rather than just those
transactions that meet a predefined attack profile. Also, new exploits
and attacks are handled just as effectively as known attacks, resulting
in better identification of attack methodologies as well as the
identification and analysis of new attack types. Since the IMDS only has
to be concerned with the traffic going to its simulated hosts it
additionally eliminates the bandwidth limitation that plagues a
traditional intrusion detection system (IDS).