Two Taxonomies of Deception for Attacks on Information Systems
dc.contributor.author | Rowe, Neil C. | |
dc.contributor.author | Rothstein, Hy S. | |
dc.date | July 2004 | |
dc.date.accessioned | 2013-10-08T18:41:32Z | |
dc.date.available | 2013-10-08T18:41:32Z | |
dc.date.issued | 2004-07 | |
dc.identifier.citation | Journal of Information Warfare, 3 (2), July 2004, 27-39. | |
dc.identifier.uri | https://hdl.handle.net/10945/36832 | |
dc.description | This paper appeared in the Journal of Information Warfare, 3 (2), July 2004, 27-39. | en_US |
dc.description.abstract | 'Cyberwar' is information warfare directed at the software of information systems. It represents an increasing threat to our militaries and civilian infrastructures. Six principles of military deception are enumerated and applied to cyberwar. Two taxonomies of deception methods for cyberwar are then provided, making both offensive and defensive analogies from deception strategies and tactics in conventional war to this new arena. One taxonomy has been published in the military literature, and the other is based on case theory in linguistics. The application of both taxonomies to cyberwar is new. We then show how to quantify and rank proposed deceptions for planning using 'suitability' numbers associated with the taxonomies. The paper provides planners for cyberwar with a more comprehensive enumeration than any yet published to the tactics and strategies that they and their enemies may use. Some analogies to deception in conventional warfare hold, but many do not, and careful thought and preparation must be applied to any deception effort. | en_US |
dc.publisher | Monterey, California. Naval Postgraduate School | en_US |
dc.title | Two Taxonomies of Deception for Attacks on Information Systems | en_US |
dc.type | Conference Paper | en_US |
dc.subject.author | Deception | en_US |
dc.subject.author | information warfare | en_US |
dc.subject.author | information systems | en_US |
dc.subject.author | tactics | en_US |
dc.subject.author | defense | en_US |
dc.subject.author | decoys | en_US |
dc.subject.author | honeypots | en_US |
dc.subject.author | lying | en_US |
dc.subject.author | disinformation | en_US |
dc.description.distributionstatement | Approved for public release; distribution is unlimited. |