DocumentCode
464212
Title
Finding Logically Consistent Resource-Deception Plans for Defense in Cyberspace
Author
Rowe, Neil C.
Author_Institution
U.S. Naval Postgrad. Sch., Monterey, CA
Volume
1
fYear
2007
fDate
21-23 May 2007
Firstpage
563
Lastpage
568
Abstract
We explore a new approach to defense of computer systems, deliberately deceiving attackers as to resource availability. This can be more effective than outright denial of access because it encourages an attacker to waste time continuing their attack. But effective deceptions must be consistent to convince an adversary. We are exploring automated methods for maintaining logical consistency by tracking assertions made so far with associated causal and other indirect implications. We have built a deception planner that takes as input as sequence of operating-system commands and finds the possible consistent deceptions as per our logical constraints, and rates the deceptions using several criteria. In a test on a generic planning model of rootkit installation, it found 72 of 558 possible deceptions were acceptable and rated them.
Keywords
authorisation; operating systems (computers); resource allocation; access denial system; computer system defense; cyberspace; logically consistent resource-deception plan; operating system command; resource availability; Access control; Availability; Impedance; Internet; Invasive software; Military computing; Protection; Psychology; Testing; Waste materials;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on
Conference_Location
Niagara Falls, Ont.
Print_ISBN
978-0-7695-2847-2
Type
conf
DOI
10.1109/AINAW.2007.186
Filename
4221117
Link To Document