Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim

被引:0
|
作者
Hong, Quan [1 ,2 ]
Li, Jiaqi [1 ,2 ]
Guo, Xizhong [1 ]
Xie, Pan [3 ]
Zhai, Lidong [2 ]
机构
[1] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[3] China United Network Commun Grp Co Ltd, Beijing, Peoples R China
关键词
CyberBattleSim; Deception-Based Defense; Cybersecurity; Defense Effect Evaluation; Simulation;
D O I
10.1007/978-3-031-56583-0_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deception-Based Cyber Defense technology involves deploying various elements within a network to deliberately mislead and deceive potential attackers, enabling the early detection and warning of cyber-attacks in their nascent stages. However, there is a lack of systematic research on defensive effectiveness, applicability in different scenarios, and potential synergies with other defense mechanisms of various deception technologies. To address this research gap, this study incorporates negative rewards within the CyberBattleSim platform to simulate the consequences imposed on adversaries when encountering deception techniques. We then assess the efficacy of diverse cyber deception strategies through the cumulative reward trend of attackers. Furthermore, we simulated the combined deployment of different deception technologies and the deployment of deception technology in distinct network scenarios, to evaluate the synergistic impact of deception technologies when coupled with other defensive measures and explore the suitable application scenarios of deception technology. The outcomes of multiple experiments conducted on the CyberBattleSim platform demonstrate that deception technology can impact attackers by delaying or preventing penetration and the combination of distinct deception techniques can yield varying enhancements in defense effectiveness. Additionally, the combination of Shock Trap and honeypot technology can maximize the defense effect.
引用
收藏
页码:224 / 243
页数:20
相关论文
共 50 条
  • [1] A SPL Framework for Adaptive Deception-based Defense
    De Faveri, Cristiano
    Moreira, Ana
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 5542 - 5551
  • [2] Game Theory Approaches for Evaluating the Deception-based Moving Target Defense
    Ma, Duohe
    Tang, Zhimin
    Sun, Xiaoyan
    Guo, Lu
    Wang, Liming
    Chen, Kai
    PROCEEDINGS OF THE 9TH ACM WORKSHOP ON MOVING TARGET DEFENSE, MTD 2022, 2022, : 67 - 77
  • [3] Deception-Based Hermeneutical Injustice
    Luzzi, Federico
    EPISTEME-A JOURNAL OF INDIVIDUAL AND SOCIAL EPISTEMOLOGY, 2024, 21 (01): : 147 - 165
  • [4] Denial and Deception in Cyber Defense
    Heckman, Kristin E.
    Stech, Frank J.
    Schmoker, Ben S.
    Thomas, Roshan K.
    COMPUTER, 2015, 48 (04) : 36 - 44
  • [5] Improving Quality of Service and HTTPS DDoS Detection in MEC Environment With a Cyber Deception-Based Architecture
    Kabdjou, Joelle
    Shinomiya, Norihiko
    IEEE ACCESS, 2024, 12 : 23490 - 23503
  • [6] On Deception-Based Protection Against Cryptographic Ransomware
    Genc, Ziya Alper
    Lenzini, Gabriele
    Sgandurra, Daniele
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT (DIMVA 2019), 2019, 11543 : 219 - 239
  • [7] What You See Is Not What You Get: Towards Deception-Based Data Moving Target Defense
    Zhang, Yaqin
    Ma, Duohe
    Sun, Xiaoyan
    Chen, Kai
    Liu, Feng
    2020 IEEE 39TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2020,
  • [8] Deception used for Cyber Defense of Control Systems
    McQueen, Miles A.
    Boyer, Wayne F.
    HSI: 2009 2ND CONFERENCE ON HUMAN SYSTEM INTERACTIONS, 2009, : 621 - 628
  • [9] Dynamic deception-based technique for crypto-ransomware detection
    Jagannathan, Kiruthika
    Sheen, Shina
    International Journal of Security and Networks, 2024, 19 (04) : 210 - 223
  • [10] Active cyber defense with denial and deception: A cyber-wargame experiment
    Heckman, Kristin E.
    Walsh, Michael J.
    Stech, Frank J.
    O'Boyle, Todd. A.
    DiCato, Stephen R.
    Herber, Audra F.
    COMPUTERS & SECURITY, 2013, 37 : 72 - 77