Deception in defense of computer systems from cyber-attack
Abstract
While computer systems can be quite susceptible to deception by attackers, deception by defenders has increasingly been investigated
in recent years. Military history has classic examples of defensive deceptions, but not all tactics and strategies have analogies in
cyberspace. Honeypots are the most important example today; they are decoy computer systems designed to encourage attacks to
collect data about attack methods. We examine the opportunities for deception in honeypots, and then opportunities for deception in
ordinary computer systems by tactics like fake information, false delays, false error messages, and identity deception. We conclude
with possible strategic deceptions.
Description
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: The Idea Group, 2007.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Deception: Theory and Practice
Monroe, James D. (Monterey, California. Naval Postgraduate School, 2012-06);This thesis explores the history of U.S. Army deception and doctrine, and combines the insights gained with the various works on deception, cognitive psychology, communications, and decision-making in order to distill a ... -
On Deceiving Terrorists
Higginbotham, Benjamin I. (2001-12);This thesis addresses the use of deception as one means available to states for dealing with terrorists. It begins by exploring the body of theoretical literature to establish the foundation necessary for a thorough ... -
The ethics of deception in cyberspace
Rowe, Neil C. (Monterey, California. Naval Postgraduate School, 2008);We examine the main ethical issues concerning deception in cyberspace. We first discuss the concept of deception and survey ethical theories applicable to cyberspace. We then examine deception for commercial gain such as ...