Research on Deception in Defense of Information Systems
Author
Rowe, Neil C.
Auguston, Mikhail
Drusinsky, Doron
Michael, J. Bret
Date
2004-06Metadata
Show full item recordAbstract
Our research group has been broadly studying the use of deliberate deception by software to foil attacks on
information systems. This can provide a second line of defense when access controls have been breached or
against insider attacks. The thousands of new attacks being discovered every year that subvert access
controls say that such a second line of defense is desperately needed. We have developed a number of
demonstration systems, including a fake directory system intended to waste the time of spies, a Web
information resource that delays suspicious requests, a modified file-download utility that pretends to
succumb to a buffer overflow, and a tool for systematically modifying an operating system to insert deceptive
responses. We are also developing an associated theory of deception that can be used to analyze and create
offensive and defensive deceptions, with especial attention to reasoning about time using temporal logic. We
conclude with some discussion of the legal implications of deception by computers.
Description
This paper appeared in the Command and Control Research and Technology Symposium, San Diego, CA,
June 2004.
Collections
Related items
Showing items related by title, author, creator and subject.
-
The Makara of Hizballah deception in the 2006 Summer War
Acosta, David A. (Monterey, California. Naval Postgraduate School, 2007-06);Information, while always a critical element of warfare, is quickly becoming decisive in present day conflicts. While the use of this information can take many forms, one area where the discussion of information's impact ... -
Deception detection process and accuracy: an examination of how U.S. military officers detect deception in the workplace
Skidmore, Kristofer A.; Ortiz, Paul R. (Monterey, California: Naval Postgraduate School, 2014-12);Research shows that humans are, on average, only slightly better-than-chance at deception detection. Meta-analysis conducted by Charles Bond and Bella DePaulo in their work Accuracy of Deception Judgments published by ... -
Phase I report on intelligent software decoys: technical feasibility and institutional issues in the context of homeland security
Michael, James Bret; Rowe, Neil C.; Rothstein, Hy; Auguston, Mikhail; Drusinsky, Doron; Riehle, Richard (Monterey, California. Naval Postgraduate School, 2002-12-10); NPS-CS-03-001The purpose of this project is to explore the technical feasibility and institutional issues associated with applying software-based deception techniques as part of Homeland defense. At present, we refer to the embodiment ...