Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques
MetadataShow full item record
Deception of ers one means of hiding things from an adversary. This paper introduces a model for understanding, comparing, and developing methods of deceptive hiding. The model characterizes deceptive hiding in terms of how it defeats the underlying processes that an adversary uses to discover the hidden thing. An adversary’s process of discovery can take three forms: direct observation (sensing and recognizing), investigation (evidence collection and hypothesis formation), and learning from other people or agents. Deceptive hiding works by defeating one or more elements of these processes. The model is applied to computer security, and it is also applicable to other domains.
Journal of Information Warfare, Vol. 5, No. 3, 2006, pp. 26-40.
Showing items related by title, author, creator and subject.
Wirtz, James J. (2008);History is replete with examples of militaries that have used denial and deception to gain victory on the battlefield. Denial withholds accurate information from an adversary, while deception puts forward misleading ...
Lopez, Dave A. (Monterey, California. Naval Postgraduate School, 2010-03);The international system of the twenty-first century calls for new ways to resolve conflicts. Traditional influence strategies, such as deterrence and compellence, have undergone new revisions to conform to new challenges. ...
McLaughlin, J. Ryan (Monterey, California: Naval Postgraduate School, 2013-09);Simulation of threat aircraft tactics and capabilities during training is an integral component of maintaining the combat readiness of the United States Navy. A dedicated adversary air force supports the majority of adversary ...