Retrospectively Using Multilayer Deception in Depth Against Advanced Persistent Threats

dc.contributor.author Landsborough, Jason
dc.contributor.author Nguyen, Thuy
dc.contributor.author Rowe, Neil
dc.date.accessioned 2023-12-26T18:36:34Z
dc.date.available 2023-12-26T18:36:34Z
dc.date.issued 2024-01-03
dc.identifier.isbn 978-0-9981331-7-1
dc.identifier.other bbd91b45-9619-4d3d-ab41-757a8f682c37
dc.identifier.uri https://hdl.handle.net/10125/106492
dc.language.iso eng
dc.relation.ispartof Proceedings of the 57th Hawaii International Conference on System Sciences
dc.rights Attribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.uri https://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subject Cyber Deception and Cyberpsychology for Defense
dc.subject advanced persistent threat
dc.subject apt analysis
dc.subject deception in depth
dc.subject mitre att&ck
dc.subject multilayer defense
dc.title Retrospectively Using Multilayer Deception in Depth Against Advanced Persistent Threats
dc.type Conference Paper
dc.type.dcmi Text
dcterms.abstract Defensive cyber deception is useful in both the information and cognitive domains of warfare. Such deception works better when it is multilayer as a defense-in-depth strategy. We developed a tool to analyze the offensive tactics in the MITRE ATT&CK Enterprise framework that were popular with sixteen Advanced Persistent Threat (APT) groups, and identified deceptive defense methods that can counter each technique. With this knowledge defenders can make more informed decisions while planning the deception to use in different layers. We use as examples three recent high-profile APT events, and review how well the deception methods could interfere with them.
dcterms.extent 10 pages
prism.startingpage 944
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
0092.pdf
Size:
641.49 KB
Format:
Adobe Portable Document Format
Description: