Planning and Integrating Deception into Computer Security Defenses
-
Upload
mohammed-almeshekah -
Category
Technology
-
view
133 -
download
0
Transcript of Planning and Integrating Deception into Computer Security Defenses
![Page 1: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/1.jpg)
Planning and Integrating Deception into Computer Security Defenses
!
NSPW’14
Mohammed [email protected]
Eugene [email protected]
![Page 2: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/2.jpg)
Deception to Improve Security
• Used as ad-hoc attempt:• Deception has been mainly
used as “trapping” or “deterrence” tools.
• Traditional security (-) and deception (+) work in tandem.
• Three unique advantages:1.Increase entropy of leakage.2.Gain information about
adversaries.3.Gives defenders an edge in
OODA.
![Page 3: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/3.jpg)
Deception Model (1) Strategic Goal
Why are you using this deceptive method?
![Page 4: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/4.jpg)
Deception Model (2) Desired Reaction(s)
What effect(s) do you want to see on the
attacker?
![Page 5: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/5.jpg)
Deception Model (3) Exploit Attacker’s Biases
What are the plausible responses to the attack and which ones should
you use?
![Page 6: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/6.jpg)
Deception Model (4) Apply Deception
Make your system lie
![Page 7: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/7.jpg)
Deception Model (4) Apply Deception
![Page 8: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/8.jpg)
Deception Model (5) Deception Feedback Channels
Define Success and Failure
![Page 9: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/9.jpg)
Deception Model (6) Risk Assessment
Assess the new risks introduced by deception
![Page 10: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/10.jpg)
Deception Model (7) Implementation and Integration
Deceptive components should be part of the real
system
![Page 11: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/11.jpg)
Deception Model (8) Monitoring and Dynamic Adjusting
Continuous monitoring and dynamic adjustment based on the attacker’s
response
![Page 12: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/12.jpg)
Deception Model (8) Monitoring and Dynamic Adjusting
Continuous monitoring and dynamic adjustment based on the attacker’s
response
![Page 13: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/13.jpg)
Deception Model (8) Monitoring and Dynamic Adjusting
Continuous monitoring and dynamic adjustment based on the attacker’s
response
![Page 14: Planning and Integrating Deception into Computer Security Defenses](https://reader033.fdocuments.in/reader033/viewer/2022060205/55a1ef391a28ab911d8b477f/html5/thumbnails/14.jpg)
Thanks!@meshekah@TheRealSpaf