A Deception Planning Framework for Cyber Defense
A Deception Planning Framework for Cyber Defense
dc.contributor.author | Jafarian, Jafar Haadi | |
dc.contributor.author | Niakanlahiji, Amirreza | |
dc.date.accessioned | 2020-01-04T07:32:31Z | |
dc.date.available | 2020-01-04T07:32:31Z | |
dc.date.issued | 2020-01-07 | |
dc.description.abstract | The role and significance of deception systems such as honeypots for slowing down attacks and collecting their signatures are well-known. However, the focus has primarily been on developing individual deception systems, and very few works have focused on developing strategies for a synergistic and strategic combination of these systems to achieve more ambitious deception goals. The objective of this paper is to lay a scientific foundation for cyber deception planning, by (1) presenting a formal deception logic for modeling cyber deception, and (2) introducing a deception framework that augments this formal modeling with necessary quantitative reasoning tools to generate coordinated deception plans. To show expressiveness and evaluate effectiveness and overhead of the framework, we use it to model and solve two important deception planning problems: (1) strategic honeypot planning, and (2) deception planning against route identification. Through these case studies, we show that the generated deception plans are highly effective and outperform alternative random and unplanned deception strategies. | |
dc.format.extent | 10 pages | |
dc.identifier.doi | 10.24251/HICSS.2020.234 | |
dc.identifier.isbn | 978-0-9981331-3-3 | |
dc.identifier.uri | http://hdl.handle.net/10125/63973 | |
dc.language.iso | eng | |
dc.relation.ispartof | Proceedings of the 53rd Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Cyber Deception for Defense | |
dc.subject | deception logic | |
dc.subject | deception modeling | |
dc.subject | deception planning | |
dc.subject | flooding attacks | |
dc.subject | honeypots | |
dc.title | A Deception Planning Framework for Cyber Defense | |
dc.type | Conference Paper | |
dc.type.dcmi | Text |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 0189.pdf
- Size:
- 974.66 KB
- Format:
- Adobe Portable Document Format
- Description: