Assessing the Effectiveness of Deception-Based Cyber Defense with CyberBattleSim

被引:0
|
作者
Hong, Quan [1 ,2 ]
Li, Jiaqi [1 ,2 ]
Guo, Xizhong [1 ]
Xie, Pan [3 ]
Zhai, Lidong [2 ]
机构
[1] Univ Chinese Acad Sci, Sch Cyber Secur, Beijing, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, Beijing, Peoples R China
[3] China United Network Commun Grp Co Ltd, Beijing, Peoples R China
关键词
CyberBattleSim; Deception-Based Defense; Cybersecurity; Defense Effect Evaluation; Simulation;
D O I
10.1007/978-3-031-56583-0_15
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Deception-Based Cyber Defense technology involves deploying various elements within a network to deliberately mislead and deceive potential attackers, enabling the early detection and warning of cyber-attacks in their nascent stages. However, there is a lack of systematic research on defensive effectiveness, applicability in different scenarios, and potential synergies with other defense mechanisms of various deception technologies. To address this research gap, this study incorporates negative rewards within the CyberBattleSim platform to simulate the consequences imposed on adversaries when encountering deception techniques. We then assess the efficacy of diverse cyber deception strategies through the cumulative reward trend of attackers. Furthermore, we simulated the combined deployment of different deception technologies and the deployment of deception technology in distinct network scenarios, to evaluate the synergistic impact of deception technologies when coupled with other defensive measures and explore the suitable application scenarios of deception technology. The outcomes of multiple experiments conducted on the CyberBattleSim platform demonstrate that deception technology can impact attackers by delaying or preventing penetration and the combination of distinct deception techniques can yield varying enhancements in defense effectiveness. Additionally, the combination of Shock Trap and honeypot technology can maximize the defense effect.
引用
收藏
页码:224 / 243
页数:20
相关论文
共 50 条
  • [41] A NEW DYNAMIC DEFENSE MODEL BASED ON ACTIVE DECEPTION
    Gong Jing Sun Zhixin Gu Qiang(College of Mathematics & Physics
    Journal of Electronics(China), 2009, 26 (02) : 205 - 213
  • [42] A Cyber Deception Method Based on Container Identity Information Anonymity
    Li, Lingshu
    Wu, Jiangxing
    Zeng, Wei
    Cheng, Xiaotao
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2021, E104D (06): : 893 - 896
  • [43] Strategic Defense and Attack in Deception based Network Security
    Fraunholz, Daniel
    Schotten, Hans Dieter
    2018 32ND INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2018, : 156 - 161
  • [44] Examining the Efficacy of Decoy-based and Psychological Cyber Deception
    Ferguson-Walter, Kimberly J.
    Major, Maxine M.
    Johnson, Chelsea K.
    Muhleman, Daniel H.
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 1127 - 1144
  • [45] TangleNet: An advanced cyber deception model based on reinforcement learning
    Gazdar, Tahani
    Murad, Lara
    Al-jahdali, Safana
    Zwawi, Fai
    Mandili, Reman
    ROMANIAN JOURNAL OF INFORMATION TECHNOLOGY AND AUTOMATIC CONTROL-REVISTA ROMANA DE INFORMATICA SI AUTOMATICA, 2025, 35 (01): : 23 - 36
  • [46] Deception-based Privacy Preservation Method of Dispatch Decision-making Model for Distribution Network in Cloud Computing Environment
    Li Z.
    Yuan C.
    Yang F.
    Yao G.
    Xin H.
    Wang W.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2023, 47 (08): : 80 - 88
  • [47] DCT-Based Cyber Defense Techniques
    Amsalem, Yaron
    Puzanov, Anton
    Bedinerman, Anton
    Kutcher, Maxim
    Hadar, Ofer
    APPLICATIONS OF DIGITAL IMAGE PROCESSING XXXVIII, 2015, 9599
  • [48] SDN-based cyber defense: A survey
    Yurekten, Ozgur
    Demirci, Mehmet
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 115 : 126 - 149
  • [49] Attacker Skill, Defender Strategies and the Effectiveness of Migration-Based Moving Target Defense in Cyber Systems
    Ben-Asher, Noam
    Morris-King, James
    Thompson, Brian
    Glodek, William
    PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 21 - 30
  • [50] HoneyFactory: Container-Based Comprehensive Cyber Deception Honeynet Architecture
    Yu, Tianxiang
    Xin, Yang
    Zhang, Chunyong
    ELECTRONICS, 2024, 13 (02)