One Time Hostname is a system and method for securing access to network assets
Which problem does OTH solve?
An Internet service is known with a FQDN/full qualified domain name.
The FQDN is static. The hostname (part of the FQDN) and the associated IP address are well-known: e.g. www.google.com.
The Internet service is exposed to continuous threats :
Service saturation: Distributed Denial of service attacks / DDOS
Wasteful consumption of the Internet link capacity : Continuous malicious scanning
Endless malicious attempts to access the service : Brute force or dictionary attacks, exploitation of all kinds of vulnerabilities, use of stolen credentials, etc.
How does OTH solve this problem ?
OTH is intended for users or devices who are authorized to access a service on the Internet. A user can be human or software component (bot). A device can be a connected device or object (IoT).
With OTH, the FQDN and the associated IP address of Internet service continuously change in time. The target is always moving. This is very hard to find the name or the IP address of a target.
Brief description of the OTH concept
OTH stands for « One Time Hostname »
OTH is a system and method for securing access to network assets.
Same goal of SDP/Software-Defined Perimeter
Help to enforce Zero-Trust principles
OTH is used to conceal an Internet service or resource on the Internet
OTH is not for anonymous access
OTH usage is | must be transparent to the user
OTH can be integrated in mobile applications or IoT devices, implemented as a software agent or module
Here's the video presentation (in French) of my conference at GoSec 2024 on the OTH / One Time Hostname concept.
Contact us for more info about OTH, Proof of Concept, license or acquisition :
info @ oth.technology
OTH is PATENTED.
OTH / One Time Hostname is an intellectual property of Tactika inc.