Experiments with a Testbed for Automated Defensive Deception Planning for Cyber-Attacks
dc.contributor.author | Rowe, Neil C. | |
dc.contributor.author | Goh, Han C. | |
dc.contributor.author | Lim, Sze L. | |
dc.contributor.author | Duong, Binh T. | |
dc.date | March 2007 | |
dc.date.accessioned | 2013-09-09T15:51:24Z | |
dc.date.available | 2013-09-09T15:51:24Z | |
dc.date.issued | 2007-03 | |
dc.identifier.citation | 2nd International Conference in I-Warfare and Security, Monterey CA, USA, March 2007 | |
dc.identifier.uri | https://hdl.handle.net/10945/35970 | |
dc.description | 2nd International Conference in I-Warfare and Security, Monterey CA, USA, March 2007 | en_US |
dc.description.abstract | A key problem in research in cyberwarfare is the difficulty of conducting experiments with real attackers; science requires experiments, and it is desirable to make information warfare scientific where we can. Some data is available regarding attacks but not much on countermeasures. We report on a testbed we are developing for conducting defensive deception experiments with the normal random background of attacks on the Internet. The testbed is built on top of a honeypot, a computer system that deliberately invites attack to yield useful intelligence about attack methods, but modified to use various deception methods to fool an attacker. Unlike earlier attempts at deception testbeds, ours permits full interaction of an attacker with our system, and thus a wide range of deceptions is possible. We present data obtained by running a partial implementation of our testbed, showing patterns in attacks over time and with system modifications. We show analysis of situations in which attackers may have been induced to leave by thinking the system was not attackable or not in their interest to attack. We also discuss design directions we are exploring. | en_US |
dc.description.sponsorship | This work was supported by the U.S. National Science Foundation under the Cyber Trust Program. | en_US |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.title | Experiments with a Testbed for Automated Defensive Deception Planning for Cyber-Attacks | en_US |
dc.type | Conference Paper | en_US |
dc.contributor.corporate | Cebrowski Institute, U.S. Naval Postgraduate School | |
dc.subject.author | Deception | en_US |
dc.subject.author | Internet | en_US |
dc.subject.author | testbed | en_US |
dc.subject.author | attack | en_US |
dc.subject.author | honeypot | en_US |
dc.subject.author | statistics | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |