Experiments with a Testbed for Automated Defensive Deception Planning for Cyber-Attacks

Loading...
Thumbnail Image
Authors
Rowe, Neil C.
Goh, Han C.
Lim, Sze L.
Duong, Binh T.
Advisors
Second Readers
Subjects
Deception
Internet
testbed
attack
honeypot
statistics
Date of Issue
2007-03
Date
March 2007
Publisher
Monterey, California. Naval Postgraduate School
Language
Abstract
A key problem in research in cyberwarfare is the difficulty of conducting experiments with real attackers; science requires experiments, and it is desirable to make information warfare scientific where we can. Some data is available regarding attacks but not much on countermeasures. We report on a testbed we are developing for conducting defensive deception experiments with the normal random background of attacks on the Internet. The testbed is built on top of a honeypot, a computer system that deliberately invites attack to yield useful intelligence about attack methods, but modified to use various deception methods to fool an attacker. Unlike earlier attempts at deception testbeds, ours permits full interaction of an attacker with our system, and thus a wide range of deceptions is possible. We present data obtained by running a partial implementation of our testbed, showing patterns in attacks over time and with system modifications. We show analysis of situations in which attackers may have been induced to leave by thinking the system was not attackable or not in their interest to attack. We also discuss design directions we are exploring.
Type
Conference Paper
Description
2nd International Conference in I-Warfare and Security, Monterey CA, USA, March 2007
Series/Report No
Department
Identifiers
NPS Report Number
Sponsors
This work was supported by the U.S. National Science Foundation under the Cyber Trust Program.
Funding
Format
Citation
2nd International Conference in I-Warfare and Security, Monterey CA, USA, March 2007
Distribution Statement
Approved for public release; distribution is unlimited.
Rights
Collections