Startup
Senior Software Engineer
[Stealth Startup]
Senior Software Engineer
Shoretel Mar 2012 - Dec 2013
Lead Software Engineer
Nec Australia Apr 2010 - Aug 2011
Lead Software Engineer
Tma Solutions Oct 2003 - Dec 2010
Lead Software Engineer and Technical Architect
Skills:
Systems Analysis Mysql Systems Design Linux Kvm Distributed Systems Software Design C/C++ Git Linux Subversion Software Project Design Patterns Algorithms Amazon Web Services Project Leading Node.js Voip Open Source Enterprise Solutions Networking Software Architecture Microsoft Sql Server Telecommunications Communication Agile Methodologies Scrum Sip Software Architect Virtualization Software Testing Data Structures Java Postgresql Sqlite Hibernate Web Services Testing Marketing Oop Javascript C++ Enterprise Software Openstack Corporate Communication Offshore Outsourcing Outsourcing Management Kvm/Qemu Software Engineering Spring Framework Python Design Software Development Concurrent Programming Soa Software Project Management Cloud Computing Java Enterprise Edition Object Oriented Design Html5
Provided are systems, methods, and computer-program products for using deceptions to detect network scans. In various implementations, a network device, configured as a decoy network device can be configured to determine a particular network address. The network device can determine that the particular network address is unassigned. The network device can configure itself with the particular network address, wherein the network device uses the particular network address to monitor network activity for a network scan. The network device can receive a packet addressed to the particular network address. The network device can determine that received packet is associated with a scan of the network, including associating the received packet with other packets in the monitored network activity. The network device can configure one or more security settings for the network when the received packet is determined to be associated with a scan of the network.