This paper describes how basic concepts from information theory can be used to analyze deception. We show how a general definition of deception can be mapped to a simple communication model known as a Z-channel, and we show that any deception has associated with it a closely related deception we call it’s symmetric complement. These ideas allow computation of a specific form of conditional entropy which indicates the average uncertainty, in bits, that a deception imposes on a deception target. This uncertainty provides unique and general in-sight into a deceptions performance, and also indicates the general counter-deception potential available to a deception target. We then describe two deception-based mechanisms for computer security: the...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
I develop a rate-distortion analysis of signaling games with imperfect common interest. Sender and r...
The modelling of deceptions in game theory and decision theory has not been well studied, despite th...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
As the convergence between our physical and digital worlds continue at a rapid pace, securing our di...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Cyber deception is usually synonymous with nefarious activities led by attackers. Motivated attacker...
Deception technology has appeared on the market of information security systems relatively recently....
Computer networks have employed a variety of techniques to secure themselves from attackers. A techn...
The role and significance of deception systems such as honeypots for slowing down attacks and collec...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
This report describes the results of a three year research project about the use of deception in inf...
Despite the widespread use of Computer-Mediated Communication (CMC) for effective collaboration and ...
Deceptions are based on psychology, and therefore special attention should be paid to the selection ...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
I develop a rate-distortion analysis of signaling games with imperfect common interest. Sender and r...
The modelling of deceptions in game theory and decision theory has not been well studied, despite th...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
As the convergence between our physical and digital worlds continue at a rapid pace, securing our di...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Cyber deception is usually synonymous with nefarious activities led by attackers. Motivated attacker...
Deception technology has appeared on the market of information security systems relatively recently....
Computer networks have employed a variety of techniques to secure themselves from attackers. A techn...
The role and significance of deception systems such as honeypots for slowing down attacks and collec...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
This report describes the results of a three year research project about the use of deception in inf...
Despite the widespread use of Computer-Mediated Communication (CMC) for effective collaboration and ...
Deceptions are based on psychology, and therefore special attention should be paid to the selection ...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
I develop a rate-distortion analysis of signaling games with imperfect common interest. Sender and r...
The modelling of deceptions in game theory and decision theory has not been well studied, despite th...