Deception in Defense of Computer Systems from Cyber Attack

Deception in Defense of Computer Systems from Cyber Attack

Neil C. Rowe (U.S. Naval Postgraduate School, USA)
Copyright: © 2007 |Pages: 8
DOI: 10.4018/978-1-59140-991-5.ch013
OnDemand PDF Download:
$37.50

Abstract

While computer systems can be quite susceptible to deception by attackers, deception by defenders has increasingly been investigated in recent years. Military history has classic examples of defensive deceptions, but not all tactics and strategies have analogies in cyberspace. Honeypots are the most important example today; they are decoy computer systems designed to encourage attacks to collect data about attack methods. We examine the opportunities for deception in honeypots, and then opportunities for deception in ordinary computer systems by tactics like fake information, false delays, false error messages, and identity deception. We conclude with possible strategic deceptions.

Complete Chapter List

Search this Book:
Reset