Measuring Deception

So far we have presented informally a wide range of deceptions for cybersystems. The remaining chapters will provide a more systematic approach. This chapter will explain how to measure the degree to which behavior or objects are suspicious, of either tho

  • PDF / 8,935,322 Bytes
  • 339 Pages / 439.43 x 683.15 pts Page_size
  • 51 Downloads / 201 Views

DOWNLOAD

REPORT


ntroduction to Cyberdeception

Introduction to Cyberdeception

Neil C. Rowe • Julian Rrushi

Introduction to Cyberdeception

Neil C. Rowe US Naval Postgraduate School Monterey, CA, USA

Julian Rrushi Western Washington University Bellingham, WA, USA

ISBN 978-3-319-41185-9 ISBN 978-3-319-41187-3 DOI 10.1007/978-3-319-41187-3

(eBook)

Library of Congress Control Number: 2016943730 © Springer International Publishing Switzerland 2016 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer International Publishing AG Switzerland

To Suzanne, who is only occasionally deceptive. —NCR To the national hero of Albania, George Castriot, aka Skanderbeg, whose skills in deception helped protect his homeland and the entire Europe from Ottoman conquest. —JR

Preface

We need new ideas in information security. This book offers a set of interrelated ideas about using deception as a framework for attack and defense of computer systems and networks, and mostly defense. Contrary to popular belief, deception is not always bad and can be a useful tool in cyberspace. Much activity is occurring in regard to cyberdeception, so we try to convey some understanding of what is going on. This book is intended as an introduction to cyberdeception and can be used in a classroom or for independent study. The intended audience is people who deal with cybersystems in one way or another, especially programmers and people focusing on information security and information assurance. But it also includes managers and policymakers who need to understand the options. We realize that this book may seem a little cynical. We prefer to think of it as realistic. Deception, like war, is ubiquitous in human society, and it is important to address the world as it is, not as we want it to be. Will this book encourage deception and thus lead to a deterioration of societies? We think not, since there are plenty of boo