Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques
Abstract
Deception of ers one means of hiding things from an adversary. This paper introduces a
model for understanding, comparing, and developing methods of deceptive hiding. The model
characterizes deceptive hiding in terms of how it defeats the underlying processes that an
adversary uses to discover the hidden thing. An adversary’s process of discovery can take
three forms: direct observation (sensing and recognizing), investigation (evidence collection
and hypothesis formation), and learning from other people or agents. Deceptive hiding works
by defeating one or more elements of these processes. The model is applied to computer
security, and it is also applicable to other domains.
Description
Journal of Information Warfare, Vol. 5, No. 3, 2006, pp. 26-40.
Rights
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.Collections
Related items
Showing items related by title, author, creator and subject.
-
FRAMEWORK FOR ANONYMIZED COVERT COMMUNICATIONS: A BLOCKCHAIN-BASED PROOF-OF-CONCEPT
Kanth, Vikram K. (Monterey, CA; Naval Postgraduate School, 2022-09);In this dissertation, we present an information hiding approach incorporating anonymity that builds on existing classical steganographic models. Current security definitions are not sufficient to analyze the proposed ... -
Hiding in Plain Sight: Denial, Deception, and the Non-State Actor
Wirtz, James J. (2008);History is replete with examples of militaries that have used denial and deception to gain victory on the battlefield. Denial withholds accurate information from an adversary, while deception puts forward misleading ... -
Coaxing the peace : reassurance strategy in the twenty-first century
Lopez, Dave A. (Monterey, California. Naval Postgraduate School, 2010-03);The international system of the twenty-first century calls for new ways to resolve conflicts. Traditional influence strategies, such as deterrence and compellence, have undergone new revisions to conform to new challenges. ...