Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim

被引:0
|
作者
Hong, Quan [1 ,2 ]
Li, Jiaqi [1 ,2 ]
Guo, Xizhong [1 ]
Xie, Pan [3 ]
Zhai, Lidong [2 ]
机构
[1] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[3] China United Network Commun Grp Co Ltd, Beijing, Peoples R China
关键词
CyberBattleSim; Deception-Based Defense; Cybersecurity; Defense Effect Evaluation; Simulation;
D O I
10.1007/978-3-031-56583-0_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deception-Based Cyber Defense technology involves deploying various elements within a network to deliberately mislead and deceive potential attackers, enabling the early detection and warning of cyber-attacks in their nascent stages. However, there is a lack of systematic research on defensive effectiveness, applicability in different scenarios, and potential synergies with other defense mechanisms of various deception technologies. To address this research gap, this study incorporates negative rewards within the CyberBattleSim platform to simulate the consequences imposed on adversaries when encountering deception techniques. We then assess the efficacy of diverse cyber deception strategies through the cumulative reward trend of attackers. Furthermore, we simulated the combined deployment of different deception technologies and the deployment of deception technology in distinct network scenarios, to evaluate the synergistic impact of deception technologies when coupled with other defensive measures and explore the suitable application scenarios of deception technology. The outcomes of multiple experiments conducted on the CyberBattleSim platform demonstrate that deception technology can impact attackers by delaying or preventing penetration and the combination of distinct deception techniques can yield varying enhancements in defense effectiveness. Additionally, the combination of Shock Trap and honeypot technology can maximize the defense effect.
引用
收藏
页码:224 / 243
页数:20
相关论文
共 50 条
  • [31] The Relevance, Effectiveness, and Future Prospects of Cyber Deception Implementation Within Organizations
    Eng, Kaila
    King, John
    Schillaci, Carmen
    Rawal, Atul
    ASSURANCE AND SECURITY FOR AI-ENABLED SYSTEMS, 2024, 13054
  • [32] The Tularosa Study: An Experimental Design and Implementation to Quantify the Effectiveness of Cyber Deception
    Ferguson-Walter, Kimberly J.
    Shade, Temmie B.
    Rogers, Andrew, V
    Niedbala, Elizabeth M.
    Trumbo, Michael C.
    Nauer, Kevin
    Divis, Kristin M.
    Jones, Aaron P.
    Combs, Angela
    Abbott, Robert G.
    PROCEEDINGS OF THE 52ND ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2019, : 7272 - 7281
  • [33] Improving and Measuring Learning Effectiveness at Cyber Defense Exercises
    Maennel, Kaie
    Ottis, Rain
    Maennel, Olaf
    SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 123 - 138
  • [34] Deception-based knowledge in Indigenous and scientific societies: American Indian tricksters and experimental research designs
    Orr, Yancey
    Orr, Raymond
    HAU-JOURNAL OF ETHNOGRAPHIC THEORY, 2022, 12 (01) : 46 - 62
  • [35] Defense on the Move: Ant-Based Cyber Defense
    Fink, Glenn A.
    Haack, Jereme N.
    McKinnon, A. David
    Fulp, Errin W.
    IEEE SECURITY & PRIVACY, 2014, 12 (02) : 36 - 43
  • [36] Decepti-SCADA: A cyber deception framework for active defense of networked critical infrastructures
    Cifranic, Nicholas
    Hallman, Roger A.
    Romero-Mariona, Jose
    Souza, Brian
    Calton, Trevor
    Coca, Giancarlo
    INTERNET OF THINGS, 2020, 12
  • [37] Cyber Security: Assessing Our Vulnerabilities and Developing an Effective Defense
    Spafford, Eugene H.
    PROTECTING PERSONS WHILE PROTECTING THE PEOPLE, 2009, 5661 : 20 - 33
  • [38] Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks
    Ajmal, Abdul Basit
    Alam, Masoom
    Khaliq, Awais Abdul
    Khan, Shawal
    Qadir, Zakria
    Mahmud, M. A. Parvez
    IEEE ACCESS, 2021, 9 : 126789 - 126800
  • [39] Probabilistic modelling of deception-based security framework using markov decision process (vol 115, 102599, 2022)
    Haseeb, Junaid
    Malik, Saif Ur Rehman
    Mansoori, Masood
    Welch, Ian
    COMPUTERS & SECURITY, 2022, 117
  • [40] Study on the network active defense technology based on deception
    Yao, Lan
    Wang, Xin-Mei
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2008, 30 (03): : 65 - 69