首页> 外文期刊>International Journal of Cyber Warfare and Terrorism >Using Deceptive Information in Computer Security Defenses
【24h】

Using Deceptive Information in Computer Security Defenses

机译:在计算机安全防御中使用欺骗性信息

获取原文
获取原文并翻译 | 示例
           

摘要

In this paper the authors present a novel taxonomy of methods and techniques that can be used to protect digital information. The authors discuss how information has been protected and show how we can structure our methods to achieve better results. They explore the relationships among these protection techniques grouped into four categories: denial and isolation, degradation and obfuscation, negative information and deception and adversary attribution and counter-operations. The authors discuss how can they be applied at different scales within organizations. They map these protection techniques against the cyber kill-chain model and discuss some findings. Moreover, they identify the use of deceit as a useful protection technique that can significantly enhance the security of computer systems. They posit how the well-known Kerckhoff's principle has been misinterpreted to drive the security community away from deception-based mechanisms. The authors examine advantages these techniques can have when protecting our information in addition to traditional methods of denial and hardening. They show that by intelligently introducing deceit in information systems, the authors not only lead attackers astray, but also give organizations the ability to detect leakage; create doubt and uncertainty in leaked data; add risk at the adversaries' side to using the leaked information; and significantly enhance our abilities to attribute adversaries. They discuss how to overcome some of the challenges that hinder the adoption of deception-based techniques and present some recent work, their own contribution, and some promising directions for future research.
机译:在本文中,作者提出了一种可用于保护数字信息的方法和技术的新颖分类法。作者讨论了如何保护信息,并展示了我们如何构造方法以获得更好的结果。他们探讨了这些保护技术之间的关系,这些保护技术分为四类:拒绝和隔离,退化和混淆,负面信息以及欺骗和敌人的归因和反操作。作者讨论了如何在组织内部以不同的规模应用它们。他们针对网络杀伤链模型绘制了这些保护技术,并讨论了一些发现。而且,他们将欺骗手段当作一种有用的保护技术,可以显着增强计算机系统的安全性。他们认为,众所周知的Kerckhoff原理是如何被误解以驱使安全界脱离基于欺骗的机制。作者研究了这些技术在保护信息方面的优势,以及传统的拒绝和强化方法。他们表明,通过在信息系统中巧妙地引入欺骗手段,作者不仅使攻击者误入歧途,而且使组织能够发现泄漏。对泄漏的数据产生怀疑和不确定性;在对手一方增加使用泄露信息的风险;并大大增强了我们归因对手的能力。他们讨论了如何克服一些阻碍采用基于欺骗的技术的挑战,并介绍了一些近期的工作,他们自己的贡献以及未来研究的一些有希望的方向。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号