Show simple item record

dc.contributor.authorYuill, Jim
dc.contributor.authorFreer, Fred
dc.contributor.authorDenning, Dorothy
dc.date2006
dc.date.accessioned2013-11-06T21:10:34Z
dc.date.available2013-11-06T21:10:34Z
dc.date.issued2006
dc.identifier.citationYuill, J., Denning, D., and Feer, F., Using Deception to Hide Things from Hackers, Journal of Information Warfare, Vol. 5, No. 3, 2006, pp. 26-40. (.pdf)
dc.identifier.urihttp://hdl.handle.net/10945/37169
dc.descriptionJournal of Information Warfare, Vol. 5, No. 3, 2006, pp. 26-40.en_US
dc.description.abstractDeception of ers one means of hiding things from an adversary. This paper introduces a model for understanding, comparing, and developing methods of deceptive hiding. The model characterizes deceptive hiding in terms of how it defeats the underlying processes that an adversary uses to discover the hidden thing. An adversary’s process of discovery can take three forms: direct observation (sensing and recognizing), investigation (evidence collection and hypothesis formation), and learning from other people or agents. Deceptive hiding works by defeating one or more elements of these processes. The model is applied to computer security, and it is also applicable to other domains.en_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, may not be copyrighted.en_US
dc.subject.classificationcomputer security, hiding, denial, deception, operations securityen_US
dc.titleUsing Deception to Hide Things from Hackers: Processes, Principles, and Techniquesen_US
dc.contributor.departmentDefense Analysis (DA)


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record