Planning cost-effective deceptive resource denial in defense to cyber-attacks

被引:0
|
作者
Rowe, Neil
机构
关键词
deception; cyberspace; decision theory; resources; denial; lies;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks against computer systems that provide valuable services can often be effectively defended by tactics of deliberately deceptive resource denial. Delaying in response to suspicious requests is one example; it permits time to develop a good defense, facilitates analysis of the attacks and formulation of a response, and may little affect legitimate users. But delays can look suspicious; a better tactic can be for the operating system to falsely claim unavailability of some critical resources that the attacker needs (files, directories, access rights, network connections, or software). This can be more effective than using "security policy" as an excuse to deny those resources because it is unexpected and more flexible. We formulate a decision-theoretic approach to the problem of deciding when to deceive by resource denial in a sequence of interactions with a user of an operating system, and provide general formulae for decisions in planning deceptions. Our theory covers both reactive and proactive deception, and both single-session and multi-session attacks. We also provide additional criteria to ensure logically consistent tactics. We provide some evidence from a survey of users to support our modeling.
引用
收藏
页码:177 / 184
页数:8
相关论文
共 50 条
  • [1] Optimal defense resource allocation against cyber-attacks in distributed generation systems
    Mo, Huadong
    Xiao, Xun
    Sansavini, Giovanni
    Dong, Daoyi
    PROCEEDINGS OF THE INSTITUTION OF MECHANICAL ENGINEERS PART O-JOURNAL OF RISK AND RELIABILITY, 2024, 238 (06) : 1302 - 1329
  • [2] A Survey on Cyber-Attacks for Cyber-Physical Systems: Modeling, Defense, and Design
    Lian, Zhi
    Shi, Peng
    Chen, Mou
    IEEE INTERNET OF THINGS JOURNAL, 2025, 12 (02): : 1471 - 1483
  • [3] COST-EFFECTIVE DEFENSE
    CHRISTIAN, RL
    NEW REPUBLIC, 1981, 184 (11) : 7 - &
  • [4] Cyber-attacks and the right of self-defense: a case study of the Netherlands
    Oorsprong, Ferry
    Ducheine, Paul
    Pijpers, Peter
    POLICY DESIGN AND PRACTICE, 2023, 6 (02) : 217 - 239
  • [5] Experiments with a testbed for automated defensive deception planning for cyber-attacks
    Rowe, Neil
    Goh, Han
    Lim, Sze
    Duong, Binh
    ICIW 2007: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 185 - 194
  • [6] Effective Traffic Features Selection Algorithm for Cyber-Attacks Samples
    Li, Yihong
    Liu, Fangzheng
    Du, Zhenyu
    6TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2018), 2018, 1967
  • [7] Multi-agent modelling and simulation of cyber-attacks and cyber-defense for homeland security
    Kotenko, Igor
    IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS, 2007, : 614 - 619
  • [8] Cyber-attacks against cyber-physical power systems security: State estimation, attacks reconstruction and defense strategy
    Su, Qingyu
    Wang, Handong
    Sun, Chaowei
    Li, Bo
    Li, Jian
    APPLIED MATHEMATICS AND COMPUTATION, 2022, 413
  • [9] Cost-Effective Watermark Based Detector for Replay Attacks on Cyber-Physical Systems
    Fang, Chongrong
    Qi, Yifei
    Cheng, Peng
    Zheng, Wei Xing
    2017 11TH ASIAN CONTROL CONFERENCE (ASCC), 2017, : 940 - 945
  • [10] A Review on Research of Cyber-attacks and Defense in Cyber Physical Power Systems Part One Modelling and Evaluation
    Wang Q.
    Li M.
    Tang Y.
    Ni M.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2019, 43 (09): : 9 - 21