Journal ArticleDOI
Active cyber defense with denial and deception: A cyber-wargame experiment
Kristin E. Heckman,Michael J. Walsh,Frank J. Stech,Todd Aaron O'Boyle,Stephen Ralph Dicato,Audra F. Herber +5 more
Reads0
Chats0
TLDR
The cyber-wargame was designed to test a dynamic network defense cyber-security platform being researched in The MITRE Corporation's Innovation Program called Blackjack, and to investigate the utility of using denial and deception to enhance the defense of information in command and control systems.About:
This article is published in Computers & Security.The article was published on 2013-09-01. It has received 37 citations till now. The article focuses on the topics: Command and control & Adversary.read more
Citations
More filters
Journal ArticleDOI
Tipping the scales: the attribution problem and the feasibility of deterrence against cyberattack
TL;DR: A formal model is used to explain why there are many low-value anonymous attacks but few high-value ones, showing how different assumptions about the scaling of exploitation and retaliation costs lead to different degrees of coverage and effectiveness for deterrence by denial and punishment.
Journal ArticleDOI
Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace
Erik Gartzke,Jon R. Lindsay +1 more
TL;DR: The strategy of deception has other important implications: as deterrence became foundational in the nuclear era, deception should rise in prominence in a world that increasingly depends on technology to mediate interaction.
Journal ArticleDOI
Adaptive artificial immune networks for mitigating DoS flooding attacks
TL;DR: The use of artificial immune systems to mitigate denial of service attacks is proposed, based on building networks of distributed sensors suited to the requirements of the monitored environment, capable of identifying threats and reacting according to the behavior of the biological defense mechanisms in human beings.
Journal ArticleDOI
Deception Techniques in Computer Security: A Research Perspective
TL;DR: A comprehensive classification of existing solutions is introduced and the current application of deception techniques in computer security is surveyed, including the design of strategies to help defenders to design and integrate deception within a target architecture.
Journal ArticleDOI
Hierarchical multistage Gaussian signaling games in noncooperative communication and control systems
TL;DR: Finite horizon hierarchical signaling games between (information provider) senders and (decision maker) receivers in a dynamic environment are analyzed and it is shown that memoryless “linear” sender signaling rules are optimal within the general class of measurable policies in the noncooperative communication context.
References
More filters
Proceedings Article
A virtual honeypot framework
TL;DR: Honeyd is presented, a framework for virtual honeypots that simulates virtual computer systems at the network level and shows how the Honeyd framework helps in many areas of system security, e.g. detecting and disabling worms, distracting adversaries, or preventing the spread of spam email.
Journal ArticleDOI
The Honeynet Project: trapping the hackers
TL;DR: The Honeynet Project gathers information by deploying networks that are designed to be compromised, and studies the bad guys and shares the lessons learned.
Book
Cheating and Deception
TL;DR: Cheating and deception are terms often used but rarely defined; even those deeply involved with cheating and deception rationalize why they have been driven to it as mentioned in this paper. But they summon up unpleasant connotations; they are rarely used to achieve national interests unless in relation to the deployment of military force.
Journal ArticleDOI
Toward a general theory of deception
TL;DR: In this article, a general theory of deception is proposed for military deception and strategic surprise in the context of strategic surprise, and the theory is extended to include deception in general theory.