Planning cost-effective deceptive resource denial in defense to cyber-attacks

被引:0
|
作者
Rowe, Neil
机构
关键词
deception; cyberspace; decision theory; resources; denial; lies;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber-attacks against computer systems that provide valuable services can often be effectively defended by tactics of deliberately deceptive resource denial. Delaying in response to suspicious requests is one example; it permits time to develop a good defense, facilitates analysis of the attacks and formulation of a response, and may little affect legitimate users. But delays can look suspicious; a better tactic can be for the operating system to falsely claim unavailability of some critical resources that the attacker needs (files, directories, access rights, network connections, or software). This can be more effective than using "security policy" as an excuse to deny those resources because it is unexpected and more flexible. We formulate a decision-theoretic approach to the problem of deciding when to deceive by resource denial in a sequence of interactions with a user of an operating system, and provide general formulae for decisions in planning deceptions. Our theory covers both reactive and proactive deception, and both single-session and multi-session attacks. We also provide additional criteria to ensure logically consistent tactics. We provide some evidence from a survey of users to support our modeling.
引用
收藏
页码:177 / 184
页数:8
相关论文
共 50 条
  • [42] CEMAP: Cost-effective mobile agent planning
    Baek, JW
    Yeo, JH
    Kim, GT
    Yeom, HY
    INTERNATIONAL JOURNAL OF COOPERATIVE INFORMATION SYSTEMS, 2004, 13 (02) : 159 - 181
  • [43] Game-theoretical Model for Dynamic Defense Resource Allocation in Cyber-physical Power Systems Under Distributed Denial of Service Attacks
    Yan, Bingjing
    Yao, Pengchao
    Yang, Tao
    Zhou, Boyang
    Yang, Qiang
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2024, 12 (01) : 41 - 51
  • [44] Game-theoretical Model for Dynamic Defense Resource Allocation in Cyber-physical Power Systems Under Distributed Denial of Service Attacks
    Bingjing Yan
    Pengchao Yao
    Tao Yang
    Boyang Zhou
    Qiang Yang
    Journal of Modern Power Systems and Clean Energy, 2024, (01) : 41 - 51
  • [45] An Efficient Intrusion Prevention System for CAN: Hindering Cyber-Attacks With a Low-cost Platform
    De Araujo-Filho, Paulo Freitas
    Pinheiro, Antonio J.
    Kaddoum, Georges
    Campelo, Divanilson R.
    Soares, Fabio L.
    IEEE ACCESS, 2021, 9 : 166855 - 166869
  • [46] DISTDET: A Cost-Effective Distributed Cyber Threat Detection System
    Dong, Feng
    Wang, Liu
    Nie, Xu
    Shao, Fei
    Wang, Haoyu
    Li, Ding
    Luo, Xiapu
    Xiao, Xusheng
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 6575 - 6592
  • [47] Defensive Resource Allocation Method for Improving Survivability of Communication and Information System in CPPS Against Cyber-attacks
    Wu, Yingjun
    Xu, Hao
    Ni, Ming
    JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2020, 8 (04) : 750 - 759
  • [48] Defensive Resource Allocation Method for Improving Survivability of Communication and Information System in CPPS Against Cyber-attacks
    Yingjun Wu
    Hao Xu
    Ming Ni
    Journal of Modern Power Systems and Clean Energy, 2020, 8 (04) : 750 - 759
  • [49] Cost-Effective Adversarial Attacks against Scene Text Recognition
    Yang, Mingkun
    Zheng, Haitian
    Bai, Xiang
    Luo, Jiebo
    2020 25TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION (ICPR), 2021, : 2368 - 2374
  • [50] COST-EFFECTIVE INVESTIGATION OF PATIENTS WITH SUSPECTED TRANSIENT ISCHEMIC ATTACKS
    HANKEY, GJ
    WARLOW, CP
    JOURNAL OF NEUROLOGY NEUROSURGERY AND PSYCHIATRY, 1992, 55 (03): : 171 - 176