Skip to main content

2016 | OriginalPaper | Buchkapitel

Quantifying Covertness in Deceptive Cyber Operations

verfasst von : George Cybenko, Gabriel Stocco, Patrick Sweeney

Erschienen in: Cyber Deception

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A deception is often enabled by cloaking or disguising the true intent and corresponding actions of the perpetrating actor. In cyber deception, the degree to which actions are disguised or cloaked is typically called “covertness.” In this chapter, we describe a novel approach to quantifying cyber covertness, a specific attribute of malware relative to specific alert logic that the defender uses. We propose that the covertness of an offensive cyber operation in an adversarial environment is derived from the probability that the operation is detected by the defender. We show that this quantitative concept can be computed using Covertness Block Diagrams that are related to classical reliability block diagrams used for years in the reliability engineering community. This requires methods for modeling the malware and target network defenses that allow us to calculate a quantitative measure of covertness which is interpreted as the probability of detection. Called the Covertness Score, this measure can be used by attackers to design a stealthier method of completing their mission as well as by defenders to understand the detection limitations of their defenses before they are exploited.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
Literatur
1.
Zurück zum Zitat US Army. Joint technical coordinating group for munitions effectiveness program office. US Army. Joint technical coordinating group for munitions effectiveness program office.
2.
Zurück zum Zitat David D Lynch and Institution of Electrical Engineers. Introduction to RF stealth. Scitech, 2004. David D Lynch and Institution of Electrical Engineers. Introduction to RF stealth. Scitech, 2004.
3.
Zurück zum Zitat Dave MacEslin. Methodology for Determining EW JMEM. TECH TALK, page 32, 2006. Dave MacEslin. Methodology for Determining EW JMEM. TECH TALK, page 32, 2006.
4.
Zurück zum Zitat George Cybenko and Jason Syverson. Quantitative foundations for information operations, 2007. George Cybenko and Jason Syverson. Quantitative foundations for information operations, 2007.
6.
Zurück zum Zitat US Department of Defense. The Department of Defense Cyber Strategy, 2015. US Department of Defense. The Department of Defense Cyber Strategy, 2015.
7.
Zurück zum Zitat Mark A Gallagher and Michael Horta. Cyber Joint Munitions Effectiveness Manual (JMEM). M& SJ, 8:5e14, 2013. Mark A Gallagher and Michael Horta. Cyber Joint Munitions Effectiveness Manual (JMEM). M& SJ, 8:5e14, 2013.
8.
Zurück zum Zitat US Army. Joint Publication 3–13: Information Operations, Nov 2014. US Army. Joint Publication 3–13: Information Operations, Nov 2014.
11.
Zurück zum Zitat Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiao-yong Zhou, and XiaoFeng Wang. Effective and efficient malware detection at the end host. In USENIX security symposium, pages 351–366, 2009. Clemens Kolbitsch, Paolo Milani Comparetti, Christopher Kruegel, Engin Kirda, Xiao-yong Zhou, and XiaoFeng Wang. Effective and efficient malware detection at the end host. In USENIX security symposium, pages 351–366, 2009.
12.
Zurück zum Zitat Daniel Bilar et al. Statistical structures: Fingerprinting malware for classification and analysis. Proceedings of Black Hat Federal 2006, 2006. Daniel Bilar et al. Statistical structures: Fingerprinting malware for classification and analysis. Proceedings of Black Hat Federal 2006, 2006.
13.
Zurück zum Zitat Marko Čepin. Reliability block diagram. In Assessment of Power System Reliability, pages 119–123. Springer, 2011. Marko Čepin. Reliability block diagram. In Assessment of Power System Reliability, pages 119–123. Springer, 2011.
14.
Zurück zum Zitat RG Bennetts. Analysis of reliability block diagrams by boolean techniques. Reliability, IEEE Transactions on, 31(2):159–166, 1982.CrossRefMATH RG Bennetts. Analysis of reliability block diagrams by boolean techniques. Reliability, IEEE Transactions on, 31(2):159–166, 1982.CrossRefMATH
21.
Zurück zum Zitat HP Enterprise Security. HP ArcSight ESM: powered by CORR-Engine, September 2012. HP Enterprise Security. HP ArcSight ESM: powered by CORR-Engine, September 2012.
22.
Zurück zum Zitat Sandeep Yadav, Ashwath Kumar Krishna Reddy, a.L. Narasimha Reddy, and Supranamaya Ranjan. Detecting algorithmically generated malicious domain names. Proceedings of the 10th annual conference on Internet measurement - IMC ’10, page 48, 2010. Sandeep Yadav, Ashwath Kumar Krishna Reddy, a.L. Narasimha Reddy, and Supranamaya Ranjan. Detecting algorithmically generated malicious domain names. Proceedings of the 10th annual conference on Internet measurement - IMC ’10, page 48, 2010.
30.
Zurück zum Zitat Elizabeth R DeLong, David M DeLong, and Daniel L Clarke-Pearson. Comparing the areas under two or more correlated receiver operating characteristic curves: a nonparametric approach. Biometrics, pages 837–845, 1988. Elizabeth R DeLong, David M DeLong, and Daniel L Clarke-Pearson. Comparing the areas under two or more correlated receiver operating characteristic curves: a nonparametric approach. Biometrics, pages 837–845, 1988.
31.
Zurück zum Zitat Michael O Ball. Computational complexity of network reliability analysis: An overview. Reliability, IEEE Transactions on, 35(3):230–239, 1986. Michael O Ball. Computational complexity of network reliability analysis: An overview. Reliability, IEEE Transactions on, 35(3):230–239, 1986.
32.
Zurück zum Zitat Thomas M Cover and Joy A Thomas. Elements of information theory. John Wiley & Sons, 2012. Thomas M Cover and Joy A Thomas. Elements of information theory. John Wiley & Sons, 2012.
Metadaten
Titel
Quantifying Covertness in Deceptive Cyber Operations
verfasst von
George Cybenko
Gabriel Stocco
Patrick Sweeney
Copyright-Jahr
2016
DOI
https://doi.org/10.1007/978-3-319-32699-3_3

Premium Partner