Planning cost-effective deceptive resource denial in defense to cyber-attacks

被引:0
|
作者
Rowe, Neil
机构
关键词
deception; cyberspace; decision theory; resources; denial; lies;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks against computer systems that provide valuable services can often be effectively defended by tactics of deliberately deceptive resource denial. Delaying in response to suspicious requests is one example; it permits time to develop a good defense, facilitates analysis of the attacks and formulation of a response, and may little affect legitimate users. But delays can look suspicious; a better tactic can be for the operating system to falsely claim unavailability of some critical resources that the attacker needs (files, directories, access rights, network connections, or software). This can be more effective than using "security policy" as an excuse to deny those resources because it is unexpected and more flexible. We formulate a decision-theoretic approach to the problem of deciding when to deceive by resource denial in a sequence of interactions with a user of an operating system, and provide general formulae for decisions in planning deceptions. Our theory covers both reactive and proactive deception, and both single-session and multi-session attacks. We also provide additional criteria to ensure logically consistent tactics. We provide some evidence from a survey of users to support our modeling.
引用
收藏
页码:177 / 184
页数:8
相关论文
共 50 条
  • [21] DynaShield: A Cost-Effective DDoS Defense Architecture
    Zheng, Shengbao
    Yang, Xiaowei
    SIGCOMM'18: PROCEEDINGS OF THE ACM SIGCOMM 2018 CONFERENCE: POSTERS AND DEMOS, 2018, : 15 - 17
  • [22] BRITAIN SEEKS COST-EFFECTIVE DEFENSE STRUCTURE
    BROWN, DA
    AVIATION WEEK & SPACE TECHNOLOGY, 1985, 122 (08): : 113 - 113
  • [23] Robust Substation Enhancement Strategy for Allocating the Defensive Resource Against the Cyber-Attacks on IEDs
    Zhao, Yirui
    Cao, Yijia
    Li, Yong
    Li, Zhiyi
    Yao, Wenxuan
    Shi, Xingyu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (03) : 3539 - 3550
  • [24] Robust Observer-Based Defense Strategy Against Actuator and Sensor Cyber-Attacks in DCMGs
    Kachhwaha, Mohit
    Modi, Himani
    Nehra, Mahesh Kumar
    Fulwani, Deepak
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (10) : 11687 - 11696
  • [25] A Hybrid Deep Learning Cyber-Attacks Intrusion Detection System for CAV Path Planning
    Moussa, Mohamed Mounir
    Alazzawi, Lubna
    2021 IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2021, : 607 - 610
  • [26] Fallback Control for Isochronous Energy Storage Systems in Autonomous Microgrids Under Denial-of-Service Cyber-Attacks
    Chlela, Marline
    Mascarella, Diego
    Joos, Geza
    Kassouf, Marthe
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (05) : 4702 - 4711
  • [27] Resilience-Oriented Planning of Multi-Carrier Microgrids under Cyber-Attacks
    Azimian, Mahdi
    Amir, Vahid
    Javadi, Saeid
    Mohseni, Soheil
    Brent, Alan C.
    SUSTAINABLE CITIES AND SOCIETY, 2022, 79
  • [28] Guaranteed cost control of hybrid-triggered networked systems with stochastic cyber-attacks
    Wu, Jiancun
    Peng, Chen
    Zhang, Jin
    Yang, Mingjin
    Zhang, Bao-Lin
    ISA TRANSACTIONS, 2020, 104 : 84 - 92
  • [29] Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-physical Power Systems Against Cyber-attacks
    Ni, Ming
    Li, Manli
    Li, Jun'e
    Wu, Yingjun
    Wang, Qi
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2021, 9 (03) : 477 - 484
  • [30] Cost-Effective Resource Provisioning for MapReduce in a Cloud
    Palanisamy, Balaji
    Singh, Aameek
    Liu, Ling
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (05) : 1265 - 1279