Detecting Deception in Cyber Conflict: A Strategic Approach

被引:0
|
作者
Chen, Jim [1 ]
Duvall, Gilliam [1 ]
机构
[1] DoD Natl Def Univ, Washington, DC 20319 USA
关键词
deception; conflict; detection; strategy; contexts; relationship;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Deception is a strategy that has been widely used in cyber conflict. How to detect deception in a timely manner is always a challenge, especially for a cyber commander who is at the point of making decisions with respect to the actual target to go after, the exact location of the target, the starting and ending time of a cyber operation, the type of cyber operation, the way of launching the cyber operation, and the amount of resources and support needed. It is absolutely important for the cyber commander to know for sure that he/she is not deceived by the adversary so he/she will be able to make right decisions. Varied solutions do exist. However, they are either too narrow or too broad. The solutions represented by signature technology are narrow in scope, so that they are not capable of dealing with the deception that they have not handled before. The solutions represented by behavioral analysis are relatively broad, so that they require extra time to readjust their focuses, incorporate contextual information, and combine heterogeneous data resources in order to get to what is exactly needed. In addition, the use of contexts in analysis is at random and not in a systematic way in most cases. Even when contexts are included in analysis, their relations with the relevant events are not well explored in all these solutions. To address these issues, this paper proposes a new strategic and systematic solution applying the Operational-Level Cybersecurity Strategy Formation Framework. This new solution employs dynamic contexts analysis, baseline analysis, impact analysis, and benefit-cost analysis. A case study is provided to test the effectiveness of this solution in detecting deception in a timely manner. The benefits and limitations of this solution are discussed. The areas for further research are also suggested.
引用
收藏
页码:78 / 85
页数:8
相关论文
共 50 条
  • [21] Visual Modeling of Cyber Deception
    De Faveri, Cristiano
    Moreira, Ana
    2018 IEEE SYMPOSIUM ON VISUAL LANGUAGES AND HUMAN-CENTRIC COMPUTING (VL/HCC), 2018, : 205 - 209
  • [22] Denial and Deception in Cyber Defense
    Heckman, Kristin E.
    Stech, Frank J.
    Schmoker, Ben S.
    Thomas, Roshan K.
    COMPUTER, 2015, 48 (04) : 36 - 44
  • [23] Technologies to Enable Cyber Deception
    Urias, Vincent E.
    Stout, William M. S.
    Luc-Watson, Jean
    Grim, Cole
    Liebrock, Lorie
    Merza, Monzy
    2017 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2017,
  • [24] Detecting deception attacks in cyber-physical linear parameter varying systems with packet loss
    Golabi, Arash
    Erradi, Abdelkarim
    Tantawy, Ashraf
    Shaban, Khaled
    INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING, 2023, 37 (03) : 726 - 749
  • [25] HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks
    Xin Huang
    Fei Yan
    Liqiang Zhang
    Kai Wang
    Information Systems Frontiers, 2021, 23 : 269 - 283
  • [26] HoneyGadget: A Deception Based Approach for Detecting Code Reuse Attacks
    Huang, Xin
    Yan, Fei
    Zhang, Liqiang
    Wang, Kai
    INFORMATION SYSTEMS FRONTIERS, 2021, 23 (02) : 269 - 283
  • [27] Software Diversity for Cyber Deception
    Sarr, Aliou Badra
    Anwar, Ahmed H.
    Kamhoua, Charles
    Leslie, Nandi
    Acosta, Jaime
    2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [28] STAYING WITH CONFLICT: A STRATEGIC APPROACH TO ONGOING DISPUTES
    Schneider, Carl
    FAMILY COURT REVIEW, 2009, 47 (04) : 737 - 738
  • [29] A systematic approach for detecting and clustering distributed cyber scanning
    Bou-Harb, Elias
    Debbabi, Mourad
    Assi, Chadi
    COMPUTER NETWORKS, 2013, 57 (18) : 3826 - 3839
  • [30] Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space
    Stech, Frank
    Heckman, Kristin E.
    Hilliard, Phil
    Ballo, Janice R.
    PSYCHNOLOGY JOURNAL, 2011, 9 (02): : 79 - 121