OTH
One Time Hostname is a system and method for securing access to network assets
Which problem does OTH solve?
An Internet service is known with a FQDN/full qualified domain name.
The FQDN is static. The hostname (part of the FQDN) and the associated IP address are well-known: e.g. www.google.com.
The Internet service is exposed to continuous threats :
- Service saturation: Distributed Denial of service attacks / DDOS
- Wasteful consumption of the Internet link capacity : Continuous malicious scanning
- Endless malicious attempts to access the service : Brute force or dictionary attacks, exploitation of all kinds of vulnerabilities, use of stolen credentials, etc.
How does OTH solve this problem ?
OTH is intended for users or devices who are authorized to access a service on the Internet. A user can be human or software component (bot). A device can be a connected device or object (IoT).
With OTH, the FQDN and the associated IP address of Internet service continuously change in time. The target is always moving. This is very hard to find the name or the IP address of a target.
Brief description of the OTH concept
OTH stands for « One Time Hostname »
OTH is a system and method for securing access to network assets.
- Same goal of SDP/Software-Defined Perimeter
- Help to enforce Zero-Trust principles
- OTH is used to conceal an Internet service or resource on the Internet
- OTH is not for anonymous access
- OTH usage is | must be transparent to the user
- OTH can be integrated in mobile applications or IoT devices, implemented as a software agent or module
Contact us for more info about OTH, Proof of Concept, license or acquisition :
info @ oth.technology
OTH is PATENT PENDING.
OTH / One Time Hostname is an intellectual property of Tactika inc.