Detecting Deception in Cyber Conflict: A Strategic Approach

被引:0
|
作者
Chen, Jim [1 ]
Duvall, Gilliam [1 ]
机构
[1] DoD Natl Def Univ, Washington, DC 20319 USA
关键词
deception; conflict; detection; strategy; contexts; relationship;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Deception is a strategy that has been widely used in cyber conflict. How to detect deception in a timely manner is always a challenge, especially for a cyber commander who is at the point of making decisions with respect to the actual target to go after, the exact location of the target, the starting and ending time of a cyber operation, the type of cyber operation, the way of launching the cyber operation, and the amount of resources and support needed. It is absolutely important for the cyber commander to know for sure that he/she is not deceived by the adversary so he/she will be able to make right decisions. Varied solutions do exist. However, they are either too narrow or too broad. The solutions represented by signature technology are narrow in scope, so that they are not capable of dealing with the deception that they have not handled before. The solutions represented by behavioral analysis are relatively broad, so that they require extra time to readjust their focuses, incorporate contextual information, and combine heterogeneous data resources in order to get to what is exactly needed. In addition, the use of contexts in analysis is at random and not in a systematic way in most cases. Even when contexts are included in analysis, their relations with the relevant events are not well explored in all these solutions. To address these issues, this paper proposes a new strategic and systematic solution applying the Operational-Level Cybersecurity Strategy Formation Framework. This new solution employs dynamic contexts analysis, baseline analysis, impact analysis, and benefit-cost analysis. A case study is provided to test the effectiveness of this solution in detecting deception in a timely manner. The benefits and limitations of this solution are discussed. The areas for further research are also suggested.
引用
收藏
页码:78 / 85
页数:8
相关论文
共 50 条
  • [41] Deception Tree Model for Cyber Operation
    Park, Chang-wook
    Kim, Young-gab
    [J]. 2019 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2019, : 135 - 138
  • [42] Elements of strategic denial and deception
    Shulsky A.
    [J]. Trends in Organized Crime, 2000, 6 (1) : 17 - 31
  • [43] Cyber Deception via System Manipulation
    Jones, James
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2017), 2017, : 194 - 201
  • [44] Deception for Cyber Defence: Challenges and Opportunities
    Liebowitz, David
    Nepal, Surya
    Moore, Kristen
    Christopher, Cody J.
    Kanhere, Salil S.
    Nguyen, David
    Timmer, Roelien C.
    Longland, Michael
    Rathakumar, Keerth
    [J]. 2021 THIRD IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2021), 2021, : 173 - 182
  • [45] Deception Planning Models for Cyber Security
    De Faveri, Cristiano
    Moreira, Ana
    Souza, Eric
    [J]. PROCEEDINGS OF THE 2017 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ITS APPLICATIONS (ICCSA 2017), 2017,
  • [46] Cyber Deception: Overview and the Road Ahead
    Wang, Cliff
    Lu, Zhuo
    [J]. IEEE SECURITY & PRIVACY, 2018, 16 (02) : 80 - 85
  • [47] Towards a Cognitive Theory of Cyber Deception
    Cranford, Edward A.
    Gonzalez, Cleotilde
    Aggarwal, Palvi
    Tambe, Milind
    Cooney, Sarah
    Lebiere, Christian
    [J]. COGNITIVE SCIENCE, 2021, 45 (07)
  • [48] The use of strategic deception in relationships
    Patwardhan, Abhijit
    Noble, Stephanie M.
    Nishihara, Ceri M.
    [J]. JOURNAL OF SERVICES MARKETING, 2009, 23 (05) : 318 - 325
  • [49] Another strategic deception initiative
    Mitchell, G
    [J]. BULLETIN OF THE ATOMIC SCIENTISTS, 1997, 53 (02) : 22 - 23
  • [50] ACyDS: An Adaptive Cyber Deception System
    Chiang, Cho-Yu J.
    Gottlieb, Yitzchak M.
    Sugrim, Shridatt James
    Chadha, Ritu
    Serban, Constantin
    Poylisher, Alex
    Marvel, Lisa M.
    Santos, Jonathan
    [J]. MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 800 - 805