Show simple item record

dc.contributor.authorRowe, Neil C.
dc.contributor.authorGoh, Han C.
dc.contributor.authorLim, Sze L.
dc.contributor.authorDuong, Binh T.
dc.dateMarch 2007
dc.date.accessioned2013-09-09T15:51:24Z
dc.date.available2013-09-09T15:51:24Z
dc.date.issued2007-03
dc.identifier.citation2nd International Conference in I-Warfare and Security, Monterey CA, USA, March 2007
dc.identifier.urihttps://hdl.handle.net/10945/35970
dc.description2nd International Conference in I-Warfare and Security, Monterey CA, USA, March 2007en_US
dc.description.abstractA key problem in research in cyberwarfare is the difficulty of conducting experiments with real attackers; science requires experiments, and it is desirable to make information warfare scientific where we can. Some data is available regarding attacks but not much on countermeasures. We report on a testbed we are developing for conducting defensive deception experiments with the normal random background of attacks on the Internet. The testbed is built on top of a honeypot, a computer system that deliberately invites attack to yield useful intelligence about attack methods, but modified to use various deception methods to fool an attacker. Unlike earlier attempts at deception testbeds, ours permits full interaction of an attacker with our system, and thus a wide range of deceptions is possible. We present data obtained by running a partial implementation of our testbed, showing patterns in attacks over time and with system modifications. We show analysis of situations in which attackers may have been induced to leave by thinking the system was not attackable or not in their interest to attack. We also discuss design directions we are exploring.en_US
dc.description.sponsorshipThis work was supported by the U.S. National Science Foundation under the Cyber Trust Program.en_US
dc.publisherMonterey, California. Naval Postgraduate Schoolen_US
dc.titleExperiments with a Testbed for Automated Defensive Deception Planning for Cyber-Attacksen_US
dc.typeConference Paperen_US
dc.contributor.corporateCebrowski Institute, U.S. Naval Postgraduate School
dc.subject.authorDeceptionen_US
dc.subject.authorInterneten_US
dc.subject.authortestbeden_US
dc.subject.authorattacken_US
dc.subject.authorhoneypoten_US
dc.subject.authorstatisticsen_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record