Retrospectively Using Multilayer Deception in Depth Against Advanced Persistent Threats

dc.contributor.authorLandsborough, Jason
dc.contributor.authorNguyen, Thuy
dc.contributor.authorRowe, Neil
dc.date.accessioned2023-12-26T18:36:34Z
dc.date.available2023-12-26T18:36:34Z
dc.date.issued2024-01-03
dc.identifier.doi10.24251/HICSS.2024.115
dc.identifier.isbn978-0-9981331-7-1
dc.identifier.otherbbd91b45-9619-4d3d-ab41-757a8f682c37
dc.identifier.urihttps://hdl.handle.net/10125/106492
dc.language.isoeng
dc.relation.ispartofProceedings of the 57th Hawaii International Conference on System Sciences
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.subjectCyber Deception and Cyberpsychology for Defense
dc.subjectadvanced persistent threat
dc.subjectapt analysis
dc.subjectdeception in depth
dc.subjectmitre att&ck
dc.subjectmultilayer defense
dc.titleRetrospectively Using Multilayer Deception in Depth Against Advanced Persistent Threats
dc.typeConference Paper
dc.type.dcmiText
dcterms.abstractDefensive cyber deception is useful in both the information and cognitive domains of warfare. Such deception works better when it is multilayer as a defense-in-depth strategy. We developed a tool to analyze the offensive tactics in the MITRE ATT&CK Enterprise framework that were popular with sixteen Advanced Persistent Threat (APT) groups, and identified deceptive defense methods that can counter each technique. With this knowledge defenders can make more informed decisions while planning the deception to use in different layers. We use as examples three recent high-profile APT events, and review how well the deception methods could interfere with them.
dcterms.extent10 pages
prism.startingpage944

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
0092.pdf
Size:
641.49 KB
Format:
Adobe Portable Document Format