Cyber Denial, Deception and Counter Deception A Framework for Suppor

This book presents the first reference exposition of the Cyber-Deception Chain: a flexible planning and execution framework for creating tactical, operational, or strategic deceptions. This methodology bridges the gap between the current uncoordinated pat

  • PDF / 4,427,387 Bytes
  • 262 Pages / 439.42 x 683.15 pts Page_size
  • 71 Downloads / 193 Views

DOWNLOAD

REPORT


Kristin E. Heckman Frank J. Stech Roshan K. Thomas Ben Schmoker Alexander W. Tsow

Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense

Advances in Information Security Volume 63

Series Editor Sushil Jajodia, Center for Secure Information Systems, George Mason University, Fairfax, VA 22030-4444, USA

More information about this series at http://www.springer.com/series/5576

Kristin E. Heckman • Frank J. Stech Roshan K. Thomas • Ben Schmoker Alexander W. Tsow

Cyber Denial, Deception and Counter Deception A Framework for Supporting Active Cyber Defense

Kristin E. Heckman The MITRE Corporation McLean, VA, USA

Frank J. Stech The MITRE Corporation McLean, VA, USA

Roshan K. Thomas The MITRE Corporation McLean, VA, USA

Ben Schmoker The MITRE Corporation McLean, VA, USA

Alexander W. Tsow The MITRE Corporation McLean, VA, USA

ISSN 1568-2633 Advances in Information Security ISBN 978-3-319-25131-8 ISBN 978-3-319-25133-2 DOI 10.1007/978-3-319-25133-2

(eBook)

Library of Congress Control Number: 2015953440 Springer Cham Heidelberg New York Dordrecht London © Springer International Publishing Switzerland 2015 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper Springer International Publishing AG Switzerland is part of Springer Science+Business Media (www.springer.com)

Preface

The field of cyber security has evolved over the last three decades and today is at a critical juncture. Computer network defense (CND) has reached the limits of what traditional perimeter defenses such as boundary controllers and firewalls, as well as intrusion detection systems, can do to increase an organization’s overall security posture. Sophisticated, well-organized attackers collectively known as the advanced persistent threat (APT) continue to bypass these traditional defense mechanisms by exploiting zero-day vulnerabilities. Trying to block access by intruders in many cases is futile: it is more realistic to assume that the defens