An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance, in which they attempt to identify configuration specifics of network hosts. To increase uncertainty of adversarial reconnaissance, the network administrator (henceforth, defender) can introduce deception into responses to network scans, such as obscuring certain system characteristics. We introduce a novel game theoretic model of deceptive interactions of this kind between a defender and a cyber attacker, which we call the Cyber Deception Game. We consider both a powerful (rational) attacker, who is aware of the defender's exact deception strategy, and a naive attacker who is not. We show that computing the optimal deception strategy is NP-...
We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversa...
Malicious attackers often scan nodes in a network in order to identify vulnerabilities that they may...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
An increasingly important tool for securing computer networks is the use of deceptive decoy objects ...
An increasingly important tool for securing computer networks is the use of deceptive decoy objects ...
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence...
In modern days, cyber networks need continuous monitoring to keep the network secure and available t...
In modern days, cyber networks need continuous monitoring to keep the network secure and available t...
We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversa...
Malicious attackers often scan nodes in a network in order to identify vulnerabilities that they may...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
2018-10-24Protecting an organization’s cyber assets from intrusions and breaches due to attacks by m...
An increasingly important tool for securing computer networks is the use of deceptive decoy objects ...
An increasingly important tool for securing computer networks is the use of deceptive decoy objects ...
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence...
In modern days, cyber networks need continuous monitoring to keep the network secure and available t...
In modern days, cyber networks need continuous monitoring to keep the network secure and available t...
We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversa...
Malicious attackers often scan nodes in a network in order to identify vulnerabilities that they may...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...