AbstractBoth our physical and digital worlds move quickly and put a lot of our valuable information in digital formats. At present, the predictable responses of most computer systems give attackers valuable information on how to infiltrate them. I would like to discuss in this paper how the use of deception can play a major role in improving the safety of current computer systems. This paper includes the use of deceptive techniques in many successful computer violations. There are good examples of phishing, social engineering and drive-by-download.
Why deception was used only haphazardly in computer security. In addition, some of the unique advantages of safety mechanisms based on deception lead to computer safety. I discuss a framework where deception can be planned and integrated into computer defensesDeception Techniques and their EffectsDeception is Planned actions taken to mislead and/or confuse attackers and to thereby cause them to take (or not take) specific actions that aid computer-security defenses.A Brief HistoryThroughout history, deception has developed in our societies and ultimately in our technical systems.
Deception and decoy- based mechanisms have been used for safety in mechanisms like honeypots and honeytokens for more than two decades. Two of the earliest documented uses of deceptive computer security techniques are at work of Cliff Stoll in his book The Cuckoo’s Egg  and the work of Spafford in his own lab . The Deception Toolkit (DTK),1 developed by Fred Cohen in 1997 was one of the first publicly available tools to use deception for computer defenses. In late 1990s, honeypots – a component that provides its value by being attacked by an adversary i.e. deceiving the attacker to interact with them” have been used in computer security. In 2003, Spitzner published his book on Honeypots discussing how they can be used to enhance computer defenses . Following on the idea of honeypots, a proliferation of honey-* prefixed tools have been proposed. Additionally, with the release of Tripwire, Kim and Spafford suggested the use of planted files that should not be accessed by normal users, with interesting names and/or locations and serving as bait that will trigger an alarm if they are accessed by intruders .HoneypotsHoneypots have been used in a number of security applications, including spam detection and stopping  and malware analysis . Honeypots were also used to secure databases . They begin to find their way into mobile environments  where interesting results were reported . Honeypots have been used in computing in four main areas:1. Detection2. Prevention3. Response4. ResearchLimitations of Isolated Use of Deception1. Attackers and malware are becoming increasingly sophisticated and their ability to prevent honeypots is growing2. We must be able to continually fool them that they are in the real system, but sometimes, such as polymorphic malware, not only detects honeypots, but also changes their behavior to deceive the honeypot itself, and the attackers are in a position where they have the ability to perform counter-deception activities by behaving in a different way than they would in a real environment.3. Since honeypots are completely ” false systems, ” many tools exist to determine whether the current system is a honeypot.Deception as a Security TechniqueDeception techniques are an integral part of human nature, which is used all the time around us. As an example of a disappointment commonly used in sports, teams try to disappoint the other team to believe that they are following a plan to influence their actions. The use of cosmetics can also be regarded as mild deception. We utilize harmless exaggerations in discussion to stow away gentle passes in manners. In cybersecurity, double dealing and bait-based systems shelter been utilized in security. for over two decades in advances, for example, honeypots and honeytokens. At the point when assailants invade the framework and effectively conquered customary location and corruption components we might want to be able to jumble our information, as well as lead the aggressors off track by misdirecting them and attracting their regard for other information that are false or intestinally deceptive.Advantages of Using Deception in Computer Defenses1. Increases the entropy of leaked information about targeted systems during compromise attempts2. Increases the information obtained from compromise attempts3. Give defenders an edge in the OODA loop (Observe, Orient, Decide, and Act)4. Increases the risk of attacking computer systems from the adversaries’ side.Deception in the Cyber Kill-ChainThe cyber kill-chain introduced by Lockheed Martin researchers works out an intelligence-driven security model . The main reason behind this model is that for attackers to be successful they need to go through all these steps in the chain in order. Breaking the chain at any step will break the attack and the earlier that we break it the better we prevent the attackers from attacking our systems. The cyber kill-chain model is a good framework to demonstrate the effectiveness of incorporating deception at multiple levels in the chain.Deception and ObscurityDeception includes two essential advances, concealing the genuine and appearing false. Concealing a framework from an aggressor or having a strong password increases the work factor for the assailant”until the point when the double dealing is distinguished and crushed. In any framework configuration there are three levels of viewing a system’s behavior and responses to service requests . They are Truthful, Naively Deceptive, Intelligently Deceptive.Offensive DeceptionOffensively, many current, common attacks use deceptive techniques as a cornerstone of their success. For instance, phishing assaults frequently utilize two-level tricky procedures; they mislead clients into tapping on connections that have all the earmarks of being originating from real sources, which take them to the second dimension of misdirection where they will be given genuine looking sites baiting them to give their certifications. Phishing, Cross-site Scripting (XSS) , and Cross-site Request Forgery (XSRF)  are a few instances of utilizing trickery. In spite of over a time of research by both the scholastic and private parts, these issues are causing more harm each year. XSS and XSRF have stayed on the OWASP’s best ten rundowns since the first occasion when they were included 2007 . The viability of hostile duplicity procedures ought to inspire security scientists to consider positive applications for misleading in security resistances.A Framework to Integrate Deception in Computer DefensesThere is a framework that can be used to plan and integrate deception in computer security defenses . Many computer defenses that use deception to incorporate deceptive elements in their design. This framework can be used to incorporate deception in many parts of a computer system and discuss how we can use such techniques effectively. A successful deception should present plausible alternative(s) to the truth and these should be designed to exploit specific adversaries’ biases.The Role of BiasesBiases are a foundation segment to the achievement of any misdirection-based instrument. The objective of the duplicity should be given a conceivable “trickery” to effectively mislead as well as confound him. An effective trickiness should misuse a predisposition in the assailants’ observation and furnish them with at least one conceivable elective data other than reality. There are four major groups of biases any analysts need to be aware of: personal biases, cultural biases, organizational biases, and cognitive biases.Planning Deception In the above figure shown, there are six essential steps to planning a successful deception-based defensive component.Implementing and Integrating DeceptionMany deception-based mechanisms are implemented as a separate disjoint component from genuine generation frameworks, as in the honeypot precedent. With the progression of numerous location strategies utilized by enemies and malware, aggressors can recognize whether they are in genuine framework or a “phony” framework , and after that change conduct as needs be. A fruitful duplicity task should be incorporated with the genuine activity.Monitoring and Evaluating the Use of DeceptionIdentifying and monitoring the feedback channels is critical to the success of any deception operation/component. Hesketh discussed three general categories of signals that can be used to know whether a deception was successful or not : 1. The target acts in the wrong time and/or place. 2. The target acts in a way that is wasteful of his resources. 3. The target delays acting or stop acting at all.Acknowledgements Parts of this report were supported by National Science Foundation Grant EAGER-1548114, by Northrop Grumman Corporation (NGCRC), and by sponsors of the Center for Education and Research in Information Assurance and Security (CERIAS).
Cite this essay
AbstractBoth our physical and digital worlds move quickly and put a lot. (2019, Aug 20). Retrieved from https://studymoose.com/abstractboth-our-physical-and-digital-worlds-move-quickly-and-put-a-lot-essay
This is just a sample. You can get your custom paper from our
Question 1: How would you explain the nature of the panel interview Maria had to endure? Specifically do you think it reflected a well thought out interviewing strategy on the part of the firm or carelessness on the part of the firm’s management? If it was carelessness, what would you do to improve the interview...
An alcoholic is a man or a woman who suffers from alcoholism – they have a distinct physical desire to consume alcohol beyond their capacity to control it, regardless of all rules of common sense. According to Alcoholics Anonymous UK, who say they have no unique definition for alcoholism, it may be described as a...
Every country measures life expectancy as an index to express the average of years for a person to live in the scale of mortality indicator of a certain period (OECD, 2007). This index is usually affected by particular conditions such as health, education and specific factors of the country or territory. These characteristics have become...
“Something could be exchanged… we still had our bodies. ” (Chapter 1) How are the women in The Handmaid’s Tale both oppressed and the oppressors? Atwood’s novel portrays strong feminist ideas throughout the tale, suggesting how women could become oppressed in the future. The Giledean state runs its laws and regulations based on extreme biblical...
A lot of people in the world ask this question. The answer to that question is that Confucianism is a religion based in Asia that was made before Christ’s birth. Confucianism is a religion that teaches you how you should live your life. All of the information was found on religioustolerance. org, and was written...
Not Finding What You Need?
Search for essay samples now
Copying content is not allowed on this website
Ask a professional writer to help you with your text