scispace - formally typeset
Journal ArticleDOI

Active cyber defense with denial and deception: A cyber-wargame experiment

Reads0
Chats0
TLDR
The cyber-wargame was designed to test a dynamic network defense cyber-security platform being researched in The MITRE Corporation's Innovation Program called Blackjack, and to investigate the utility of using denial and deception to enhance the defense of information in command and control systems.
About
This article is published in Computers & Security.The article was published on 2013-09-01. It has received 37 citations till now. The article focuses on the topics: Command and control & Adversary.

read more

Citations
More filters
Journal ArticleDOI

Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack

TL;DR: A formal model is used to explain why there are many low-value anonymous attacks but few high-value ones, showing how different assumptions about the scaling of exploitation and retaliation costs lead to different degrees of coverage and effectiveness for deterrence by denial and punishment.
Journal ArticleDOI

Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace

Erik Gartzke, +1 more
- 22 Jun 2015 - 
TL;DR: The strategy of deception has other important implications: as deterrence became foundational in the nuclear era, deception should rise in prominence in a world that increasingly depends on technology to mediate interaction.
Journal ArticleDOI

Adaptive artificial immune networks for mitigating DoS flooding attacks

TL;DR: The use of artificial immune systems to mitigate denial of service attacks is proposed, based on building networks of distributed sensors suited to the requirements of the monitored environment, capable of identifying threats and reacting according to the behavior of the biological defense mechanisms in human beings.
Journal ArticleDOI

Deception Techniques in Computer Security: A Research Perspective

TL;DR: A comprehensive classification of existing solutions is introduced and the current application of deception techniques in computer security is surveyed, including the design of strategies to help defenders to design and integrate deception within a target architecture.
Journal ArticleDOI

Hierarchical multistage Gaussian signaling games in noncooperative communication and control systems

TL;DR: Finite horizon hierarchical signaling games between (information provider) senders and (decision maker) receivers in a dynamic environment are analyzed and it is shown that memoryless “linear” sender signaling rules are optimal within the general class of measurable policies in the noncooperative communication context.
References
More filters
Proceedings Article

A virtual honeypot framework

TL;DR: Honeyd is presented, a framework for virtual honeypots that simulates virtual computer systems at the network level and shows how the Honeyd framework helps in many areas of system security, e.g. detecting and disabling worms, distracting adversaries, or preventing the spread of spam email.
Journal ArticleDOI

The Honeynet Project: trapping the hackers

TL;DR: The Honeynet Project gathers information by deploying networks that are designed to be compromised, and studies the bad guys and shares the lessons learned.
Book

Cheating and Deception

TL;DR: Cheating and deception are terms often used but rarely defined; even those deeply involved with cheating and deception rationalize why they have been driven to it as mentioned in this paper. But they summon up unpleasant connotations; they are rarely used to achieve national interests unless in relation to the deployment of military force.
Journal ArticleDOI

Toward a general theory of deception

TL;DR: In this article, a general theory of deception is proposed for military deception and strategic surprise in the context of strategic surprise, and the theory is extended to include deception in general theory.
Journal ArticleDOI

The Craft of Intelligence

Related Papers (5)