Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques
Loading...
Authors
Yuill, Jim
Freer, Fred
Denning, Dorothy
Advisors
Second Readers
Subjects
computer security
hiding
denial
deception
operations security
hiding
denial
deception
operations security
Date of Issue
2006
Date
Publisher
Language
Abstract
Deception offers one means of hiding things from an adversary. This paper introduces a model for understanding, comparing, and developing methods of deceptive hiding. The model characterizes deceptive hiding in terms of how it defeats the underlying processes that an adversary uses to discover the hidden thing. An adversary’s process of discovery can take three forms: direct observation (sensing and recognizing), investigation (evidence collection and hypothesis formation), and learning from other people or agents. Deceptive hiding works by defeating one or more elements of these processes. The model is applied to computer security, and it is also applicable to other domains.
Type
Article
Description
Journal of Information Warfare, Vol. 5, No. 3, 2006, pp. 26-40.
Series/Report No
Department
Defense Analysis (DA)
Organization
Identifiers
NPS Report Number
Sponsors
Funding
Format
Citation
Yuill, J., Denning, D., and Feer, F., Using Deception to Hide Things from Hackers, Journal of Information Warfare, Vol. 5, No. 3, 2006, pp. 26-40. (.pdf)
Distribution Statement
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
