Cyber deception is a strategy that defenders can leverage to gain an advantage over cyber attackers. The effects of deception on the attacker however, are not yet well understood. Quantifying the tangible and emotional effects of deception on the attacker’s performance, beliefs, and emotional state are critical to deploying effective, targeted cyber deception. Our work uses data from a human-subjects experiment measuring the impact of cyber and psychological deception on over 100 professional red-teamers. These results demonstrate that an attacker’s cognitive and emotional state can often be inferred from data already observed and collected by cyber defenders world-wide. Future work will leverage this observed data-set to formulate more inf...
Computer network attackers currently benefit from an asymmetric advantage, leveraging both features ...
In modern days, cyber networks need continuous monitoring to keep the network secure and available t...
Aim The current paper aims to provide a preliminary exploration of the characteristics associated w...
The threat of cyber attacks is a growing concern across the world, leading to an increasing need for...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
Cyber deception is usually synonymous with nefarious activities led by attackers. Motivated attacker...
The Tularosa study was designed to understand how defensive deception--including both cyber and psyc...
Cyber deception has been discussed as providing enhanced cyber defense. This human subjects research...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
This paper improves upon recent game-theoretic deceptive signaling schemes for cyber defense using t...
Cyber attacks are increasingly commonplace and cause significant disruption, and therefore, have bee...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Computer network attackers currently benefit from an asymmetric advantage, leveraging both features ...
In modern days, cyber networks need continuous monitoring to keep the network secure and available t...
Aim The current paper aims to provide a preliminary exploration of the characteristics associated w...
The threat of cyber attacks is a growing concern across the world, leading to an increasing need for...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
Cyber deception is usually synonymous with nefarious activities led by attackers. Motivated attacker...
The Tularosa study was designed to understand how defensive deception--including both cyber and psyc...
Cyber deception has been discussed as providing enhanced cyber defense. This human subjects research...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
This paper improves upon recent game-theoretic deceptive signaling schemes for cyber defense using t...
Cyber attacks are increasingly commonplace and cause significant disruption, and therefore, have bee...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Computer network attackers currently benefit from an asymmetric advantage, leveraging both features ...
In modern days, cyber networks need continuous monitoring to keep the network secure and available t...
Aim The current paper aims to provide a preliminary exploration of the characteristics associated w...