Testing Deception Tactics in Response to Cyberattacks

dc.contributor.authorFrederick, Erwin E.
dc.contributor.authorRowe, Neil C.
dc.contributor.authorWong, Albert B. G.
dc.contributor.departmentComputer Science (CS)
dc.dateJune 2012
dc.date.accessioned2013-10-08T18:17:05Z
dc.date.available2013-10-08T18:17:05Z
dc.date.issued2012-06-11
dc.descriptionThis paper appeared in the Proceedings of the National Symposium on Moving Target Research, Annapolis, Maryland, USA, June 11, 2012.en_US
dc.description.abstractDeception can be a useful tool in defending computer systems against cyberattacks because it is unexpected and offers much variety of tactics. It is particularly useful for sites of critical infrastructure for which multiple defenses are desirable. We have developed an experimental approach to finding deceptive tactics for system defense by trying a variety of tactics against live Internet traffic and seeing what responses we get. These experiments are easiest to do on a honeypot, a computer system designed solely as an attack target. We report on three kinds of experiments with deceptive honeypots: one with modifying attack packets using Snort Inline, one with scripted responses to attacks using Honeyd, and one with a fake Web site. We found evidence of responses to our deceptions, sometimes in the form of increased session lengths and sometimes by disappearance of attackers. Some benefit was obtained by varying the deceptions over time. These results are encouraging for developing more comprehensive automated deception strategies for defending computer systems, and provide a new experimentation methodology for systematically developing deception plans.en_US
dc.description.sponsorshipsupported in part by the National Science Foundation under grant 0429411 and by the Air Force Research Instituteen_US
dc.identifier.citationProceedings of the National Symposium on Moving Target Research, Annapolis, Maryland, USA, June 11, 2012.
dc.identifier.urihttps://hdl.handle.net/10945/36826
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.subject.authordeceptionen_US
dc.subject.authorcyberattacksen_US
dc.subject.authorhoneypotsen_US
dc.subject.authortacticsen_US
dc.subject.authorHoneyden_US
dc.subject.authorSnort Inlineen_US
dc.subject.authorpacketsen_US
dc.subject.authorscriptsen_US
dc.titleTesting Deception Tactics in Response to Cyberattacksen_US
dc.typeConference Paperen_US
dspace.entity.typePublication
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Rowe_Testing_Deception.pdf
Size:
218.46 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
2.35 KB
Format:
Item-specific license agreed upon to submission
Description:
Collections