Designing Good Deceptions in Defense of Information Systems
Rowe, Neil C.
MetadataShow full item record
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permitting time to organize a better defense, and would provide a second line of defense when access controls have been breached. We propose here a probabilistic model of attacker beliefs in each of a set of "generic excuses" (including deception) for their inability to accomplish their goals. We show how the model can be updated by evidence presented to the attacker and feedback from the attacker's own behavior. We show some preliminary results with human subjects supporting our theory. We show how this analysis permits choosing appropriate times and methods to deceive the attacker.
This paper appeared in the 2004 Computer Security Applications Conference, Tucson, AZ, December.
Showing items related by title, author, creator and subject.
Soria, Javier C. (Monterey California. Naval Postgraduate School, 2006-12);Since the attacks of September 11th, 2001 involving commercial aircraft used as missiles to attack critical assets located within the United States, the U.S has worked diligently to enhance its military air defense posture. ...
Vish, Jeffrey A. (Monterey, California. Naval Postgraduate School, 2006-09);The Air Base has long been a potential target of attack for enemy planners. An effective way to attack the United States Air Force (USAF) is to avoid its usual dominance in the air and use an asymmetrical approach, attacking ...
Evaluation of a multi-agent system for simulation and analysis of distributed denial-of-service attacks Saw, Tee Huu. (Monterey, California. Naval Postgraduate School, 2003-12);DDoS attack is evolving at a rapid and alarming rate; an effective solution must be formulated using an adaptive approach. Most of the simulations are performed at the attack phase of the DDoS attack; thus the defense ...