Proceedings of the 2014 New Security Paradigms Workshop 2014
DOI: 10.1145/2683467.2683482
|View full text |Cite
|
Sign up to set email alerts
|

Planning and Integrating Deception into Computer Security Defenses

Abstract: Deceptive techniques played a prominent role in many human conflicts throughout history. Digital conflicts are no different as the use of deception has found its way to computing since at least the 1980s. However, many computer defenses that use deception were ad-hoc attempts to incorporate deceptive elements. In this paper, we present a model that can be used to plan and integrate deception in computer security defenses. We present an overview of fundamental reasons why deception works and the essential princ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
55
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 87 publications
(55 citation statements)
references
References 29 publications
0
55
0
Order By: Relevance
“…A closely related topic to deceptive path-planning is the deceptive or adversarial task planning. Braynov [ 39 ] presents a conceptual framework of planning and plan recognition as a deterministic full-information simultaneous-moves game and argues that rational players would play the Nash equilibrium in the game. The goal of the actor is to traverse an attack graph from a source to one of few targets and the observer can remove one of the edges in the attack graph per move.…”
Section: Background and Related Workmentioning
confidence: 99%
“…A closely related topic to deceptive path-planning is the deceptive or adversarial task planning. Braynov [ 39 ] presents a conceptual framework of planning and plan recognition as a deterministic full-information simultaneous-moves game and argues that rational players would play the Nash equilibrium in the game. The goal of the actor is to traverse an attack graph from a source to one of few targets and the observer can remove one of the edges in the attack graph per move.…”
Section: Background and Related Workmentioning
confidence: 99%
“…A closely related topic to deceptive path-planning is the deceptive or adversarial task planning. Braynov [35] presents a conceptual framework of planning and plan recognition as a deterministic full-information simultaneous-moves game, and argues that rational players would play the Nash equilibrium in the game. The goal of the actor is to traverse an attack graph from a source to one of few targets and the observer can remove one of the edges in the attack graph per move.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Deception technique has also been applied to malware analysis. A method using deception to analyze and protect attacks was proposed by Almeshekah et al (2014). Specifically, this method uses deception to inpel attackers toward honeypots, that is, analysis environments that mimic the production environment.…”
Section: Related Workmentioning
confidence: 99%