Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim

被引:0
|
作者
Hong, Quan [1 ,2 ]
Li, Jiaqi [1 ,2 ]
Guo, Xizhong [1 ]
Xie, Pan [3 ]
Zhai, Lidong [2 ]
机构
[1] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[3] China United Network Commun Grp Co Ltd, Beijing, Peoples R China
关键词
CyberBattleSim; Deception-Based Defense; Cybersecurity; Defense Effect Evaluation; Simulation;
D O I
10.1007/978-3-031-56583-0_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deception-Based Cyber Defense technology involves deploying various elements within a network to deliberately mislead and deceive potential attackers, enabling the early detection and warning of cyber-attacks in their nascent stages. However, there is a lack of systematic research on defensive effectiveness, applicability in different scenarios, and potential synergies with other defense mechanisms of various deception technologies. To address this research gap, this study incorporates negative rewards within the CyberBattleSim platform to simulate the consequences imposed on adversaries when encountering deception techniques. We then assess the efficacy of diverse cyber deception strategies through the cumulative reward trend of attackers. Furthermore, we simulated the combined deployment of different deception technologies and the deployment of deception technology in distinct network scenarios, to evaluate the synergistic impact of deception technologies when coupled with other defensive measures and explore the suitable application scenarios of deception technology. The outcomes of multiple experiments conducted on the CyberBattleSim platform demonstrate that deception technology can impact attackers by delaying or preventing penetration and the combination of distinct deception techniques can yield varying enhancements in defense effectiveness. Additionally, the combination of Shock Trap and honeypot technology can maximize the defense effect.
引用
收藏
页码:224 / 243
页数:20
相关论文
共 50 条
  • [21] Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception
    Rehman, Zubaida
    Gondal, Iqbal
    Ge, Mengmeng
    Dong, Hai
    Gregory, Mark
    Tari, Zahir
    COMPUTERS & SECURITY, 2024, 139
  • [22] Probabilistic modelling of deception-based security framework using markov decision process
    Haseeb, Junaid
    Malik, Saif Ur Rehman
    Mansoori, Masood
    Welch, Ian
    COMPUTERS & SECURITY, 2022, 115
  • [23] Introduction to the HICSS-55 Minitrack on Cyber Deception and Cyberpsychology for Defense
    Ferguson-Walter, Kimberly
    Bishop, Matt
    Wang, Cliff
    Fugate, Sunny
    Proceedings of the Annual Hawaii International Conference on System Sciences, 2022, 2022-January : 2185 - 2186
  • [24] Introduction to the HICSS-56 Minitrack on Cyber Deception and Cyberpsychology for Defense
    Ferguson-Walter, Kimberly
    Bishop, Matt
    Wang, Cliff
    Fugate, Sunny
    Proceedings of the Annual Hawaii International Conference on System Sciences, 2023, 2023-January
  • [25] Asymptotic Security Using Bayesian Defense Mechanism With Application to Cyber Deception
    Sasahara, Hampei
    Sandberg, Henrik
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2024, 69 (08) : 5004 - 5019
  • [26] Location Privacy-Preserving Scheme in IoBT Networks Using Deception-Based Techniques
    Alkanjr, Basmh
    Mahgoub, Imad
    SENSORS, 2023, 23 (06)
  • [27] Deception-based IDS against ARP Spoofing Attacks in Software-Defined Networks
    Mvah, Fabrice
    Tchendji, Vianney Kengne
    Djamegni, Clementin Tayou
    Anwar, Ahmed H.
    Tosh, Deepak K.
    Kamhoua, Charles
    2024 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS, ICNC, 2024, : 188 - 192
  • [28] DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and Blockchain
    Iqbal, Mubashar
    Suhail, Sabah
    Matulevicius, Raimundas
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [29] Three decades of deception techniques in active cyber defense-Retrospect and outlook
    Zhang, Li
    Thing, Vrizlynn. L. L.
    COMPUTERS & SECURITY, 2021, 106
  • [30] Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model
    Steingartner, William
    Galinec, Darko
    Kozina, Andrija
    SYMMETRY-BASEL, 2021, 13 (04):