Planning cost-effective deceptive resource denial in defense to cyber-attacks

被引:0
|
作者
Rowe, Neil
机构
关键词
deception; cyberspace; decision theory; resources; denial; lies;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks against computer systems that provide valuable services can often be effectively defended by tactics of deliberately deceptive resource denial. Delaying in response to suspicious requests is one example; it permits time to develop a good defense, facilitates analysis of the attacks and formulation of a response, and may little affect legitimate users. But delays can look suspicious; a better tactic can be for the operating system to falsely claim unavailability of some critical resources that the attacker needs (files, directories, access rights, network connections, or software). This can be more effective than using "security policy" as an excuse to deny those resources because it is unexpected and more flexible. We formulate a decision-theoretic approach to the problem of deciding when to deceive by resource denial in a sequence of interactions with a user of an operating system, and provide general formulae for decisions in planning deceptions. Our theory covers both reactive and proactive deception, and both single-session and multi-session attacks. We also provide additional criteria to ensure logically consistent tactics. We provide some evidence from a survey of users to support our modeling.
引用
收藏
页码:177 / 184
页数:8
相关论文
共 50 条
  • [31] Cost-effective Resource Provisioning for Spark Workloads
    Chen, Yuxing
    Lu, Jiaheng
    Chen, Chen
    Hoque, Mohammad
    Tarkoma, Sasu
    PROCEEDINGS OF THE 28TH ACM INTERNATIONAL CONFERENCE ON INFORMATION & KNOWLEDGE MANAGEMENT (CIKM '19), 2019, : 2477 - 2480
  • [32] Concept and Research Framework for Coordinated Situation Awareness and Active Defense of Cyber-physical Power Systems Against Cyber-attacks
    Ming Ni
    Manli Li
    Jun'e Li
    Yingjun Wu
    Qi Wang
    JournalofModernPowerSystemsandCleanEnergy, 2021, 9 (03) : 477 - 484
  • [33] Research on Power Communication Network Planning Based on Information Transmission Reachability Against Cyber-Attacks
    Wu, Yingjun
    Chen, Jinfan
    Ru, Yingtao
    Xu, Hao
    Roger, Mbonyineza
    Ni, Ming
    IEEE SYSTEMS JOURNAL, 2021, 15 (02): : 2883 - 2894
  • [34] A layered decision model for cost-effective network defense
    Wei, HQ
    Frincke, D
    Alves-Foss, J
    Soule, T
    Pforsich, H
    PROCEEDINGS OF THE 2005 IEEE INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2005, : 506 - 511
  • [35] Planning cost-effective operational forest inventories
    Karppinen, Santeri
    Ene, Liviu
    Sundstrom, Lovisa Engberg
    Karvanen, Juha
    BIOMETRICS, 2024, 80 (03)
  • [36] Cost-Effective Planning for Summer Audition Tours
    Lansky, Chava Pearl
    DANCE MAGAZINE, 2024, 98 (01): : 82 - 83
  • [37] FLEXIBILITY PLANNING KEYS COST-EFFECTIVE CONSTRUCTION
    BOYAR, RL
    HOSPITALS, 1978, 52 (09): : 79 - &
  • [38] Cost-effective planning of timed mobile agents
    Baek, JW
    Kim, GT
    Yeom, HY
    INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, PROCEEDINGS, 2002, : 536 - 541
  • [39] COST-EFFECTIVE LOGISTICS PLANNING WITH INTERACTIVE SOFTWARE
    FAULKNER, R
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 1985, 36 (12) : 1151 - 1151
  • [40] Cost-effective Network Planning for Rural Communities
    Islam, Nazrul
    Phillips, Chris
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2019, : 247 - 252