Skip to main content

2016 | OriginalPaper | Buchkapitel

Cyber-Security: Role of Deception in Cyber-Attack Detection

verfasst von : Palvi Aggarwal, Cleotilde Gonzalez, Varun Dutt

Erschienen in: Advances in Human Factors in Cybersecurity

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cyber-attacks are increasing in the real-world and cause widespread damage to cyber-infrastructure and loss of information. Deception, i.e., actions to promote the beliefs of things that are not true, could be a way of countering cyber-attacks. In this paper, we propose a deception game, which we use to evaluate the decision making of a hacker in the presence of deception. In an experiment, using the deception game, we analyzed the effect of two between-subjects factors in Hacker’s decisions to attack a computer network (N = 100 participants): amount of deception used and the timing of deception. The amount of deception used was manipulated at 2-levels: low and high. The timing of deception use was manipulated at 2-levels: early and late. Results revealed that using late and high deception condition, proportion of not attack actions by hackers are higher. Our results suggest that deception acts as a deterrence strategy for hacker.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
3.
Zurück zum Zitat Whaley, B.: Toward a general theory of deception. J. Strateg. Stud. Frank Cass Lond. 5(1), 178–192 (1982) Whaley, B.: Toward a general theory of deception. J. Strateg. Stud. Frank Cass Lond. 5(1), 178–192 (1982)
4.
Zurück zum Zitat Glantz, D.: Military Deception in the Second World War. Cass Series on Soviet Military Theory & Practice. Routledge, London. ISBN 978-0-714-63347-3 (1989) Glantz, D.: Military Deception in the Second World War. Cass Series on Soviet Military Theory & Practice. Routledge, London. ISBN 978-0-714-63347-3 (1989)
5.
Zurück zum Zitat Denning, D.: Information warfare and security. AddisonWesley, New York (1999) Denning, D.: Information warfare and security. AddisonWesley, New York (1999)
6.
Zurück zum Zitat Mitnick, K.D., Simon, W.L.: The art of deception: controlling the human element of security. Wiley, New York City (2011) Mitnick, K.D., Simon, W.L.: The art of deception: controlling the human element of security. Wiley, New York City (2011)
7.
Zurück zum Zitat Rowe, N.C., Custy, E.J.: Deception in cyber attacks. In Janczewski L.J., Colarik A.M. (Eds.), Cyber Warfare and Cyber Terrorism, Hershey, PA, Inf. Sci. Ref. pp. 91–93 (2008) Rowe, N.C., Custy, E.J.: Deception in cyber attacks. In Janczewski L.J., Colarik A.M. (Eds.), Cyber Warfare and Cyber Terrorism, Hershey, PA, Inf. Sci. Ref. pp. 91–93 (2008)
8.
Zurück zum Zitat Dutt, V., Ahn, Y.S., Gonzalez, C.: Cyber situation awareness modeling detection of cyber-attacks with instance-based learning theory. Hum. Factors J. Hum. Factors Ergon. Soc. 55(3), 605–618 (2013)CrossRef Dutt, V., Ahn, Y.S., Gonzalez, C.: Cyber situation awareness modeling detection of cyber-attacks with instance-based learning theory. Hum. Factors J. Hum. Factors Ergon. Soc. 55(3), 605–618 (2013)CrossRef
9.
Zurück zum Zitat Arora, A., Dutt, V.: Cyber security: evaluating the effects of attack strategy and base rate through instance based learning. In: 12th International Conference on Cognitive Modeling. Ottawa, Canada (2013) Arora, A., Dutt, V.: Cyber security: evaluating the effects of attack strategy and base rate through instance based learning. In: 12th International Conference on Cognitive Modeling. Ottawa, Canada (2013)
10.
Zurück zum Zitat Kaur, A., Dutt, V.: Cyber situation awareness: modeling the effects of similarity and scenarios on cyber attack detection. Paper presented at the 12th International Conference on Cognitive Modeling. Ottawa, Canada (2013) Kaur, A., Dutt, V.: Cyber situation awareness: modeling the effects of similarity and scenarios on cyber attack detection. Paper presented at the 12th International Conference on Cognitive Modeling. Ottawa, Canada (2013)
11.
Zurück zum Zitat Gonzalez, C., Dutt, V.: Instance-based learning: integrating sampling and repeated decisions from experience. Psychol. Rev. 118(4), 523 (2011)CrossRef Gonzalez, C., Dutt, V.: Instance-based learning: integrating sampling and repeated decisions from experience. Psychol. Rev. 118(4), 523 (2011)CrossRef
12.
Zurück zum Zitat Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), (pp. 1-10). IEEE (2010) Roy, S., Ellis, C., Shiva, S., Dasgupta, D., Shandilya, V., Wu, Q.: A survey of game theory as applied to network security. In: 2010 43rd Hawaii International Conference on System Sciences (HICSS), (pp. 1-10). IEEE (2010)
13.
Zurück zum Zitat Camerer, C.: Behavioral game theory: experiments in strategic interaction. Princeton University Press, Princeton (2003) Camerer, C.: Behavioral game theory: experiments in strategic interaction. Princeton University Press, Princeton (2003)
14.
Zurück zum Zitat Alpcan, T., Başar, T.: Network security: a decision and game-theoretic approach. Cambridge University Press, Cambridge (2010) Alpcan, T., Başar, T.: Network security: a decision and game-theoretic approach. Cambridge University Press, Cambridge (2010)
15.
Zurück zum Zitat Crouse, M.: Performance Analysis of Cyber Deception Using Probabilistic Models (2012) Crouse, M.: Performance Analysis of Cyber Deception Using Probabilistic Models (2012)
16.
Zurück zum Zitat Garg, N., Daniel, G.: Deception in honeynets: a game-theoretic analysis. Information Assurance and Security Workshop. IAW’07. IEEE SMC. IEEE, 2007 Garg, N., Daniel, G.: Deception in honeynets: a game-theoretic analysis. Information Assurance and Security Workshop. IAW’07. IEEE SMC. IEEE, 2007
19.
Zurück zum Zitat Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica 263–291, (1979) Kahneman, D., Tversky, A.: Prospect theory: an analysis of decision under risk. Econometrica 263–291, (1979)
20.
Zurück zum Zitat Tversky, A., Kahneman, D.: Advances in prospect theory: cumulative representation of uncertainty. J Risk Uncertainty 5(4), 297–323 (1992)CrossRefMATH Tversky, A., Kahneman, D.: Advances in prospect theory: cumulative representation of uncertainty. J Risk Uncertainty 5(4), 297–323 (1992)CrossRefMATH
21.
Zurück zum Zitat Nevo, I., Ido, E.: On surprise, change, and the effect of recent outcomes. Frontiers in psychology 3 (2012) Nevo, I., Ido, E.: On surprise, change, and the effect of recent outcomes. Frontiers in psychology 3 (2012)
23.
Zurück zum Zitat Dutt, V., Ahn, Y.S., Gonzalez, C.: Cyber situation awareness modeling detection of cyber-attacks with instance-based learning theory. Hum. Factors J. Hum. Factors Ergon. Soc. 55(3), 605–618 (2013)CrossRef Dutt, V., Ahn, Y.S., Gonzalez, C.: Cyber situation awareness modeling detection of cyber-attacks with instance-based learning theory. Hum. Factors J. Hum. Factors Ergon. Soc. 55(3), 605–618 (2013)CrossRef
Metadaten
Titel
Cyber-Security: Role of Deception in Cyber-Attack Detection
verfasst von
Palvi Aggarwal
Cleotilde Gonzalez
Varun Dutt
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-41932-9_8