Using Bayesian Attack Detection Models to Drive Cyber Deception

نویسندگان

  • James Jones
  • Kathryn B. Laskey
چکیده

We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversary to believe they are under a cyber attack when in fact they are not. Cyber network defense relies on human and computational systems that can reason over multiple individual evidentiary items to detect the presence of meta events, i.e., cyber attacks. Many of these systems aggregate and reason over alerts from Networkbased Intrusion Detection Systems (NIDS). Such systems use byte patterns as attack signatures to analyze network traffic and generate corresponding alerts. Current aggregation and reasoning tools use a variety of techniques to model meta-events, among them Bayesian Networks. However, the inputs to these models are based on network traffic which is inherently subject to manipulation. In this work, we demonstrate a capability to remotely and artificially trigger specific meta events in a potentially unknown model. We use an existing and known Bayesian Network based cyber attack detection system to guide construction of deceptive network packets. These network packets are not actual attacks or exploits, but rather contain selected features of attack traffic embedded in benign content. We provide these packets to a different cyber attack detection system to gauge their generalizability and effect. We combine the deception packets' characteristics, the second system's response, and external observables to propose a deception model to assess the effectiveness of the manufactured network traffic on our target. We demonstrate the development and execution of a specific deception, and we propose the corresponding deception model.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Security of Water SCADA Systems: (II) Attack Detection using Enhanced Hydrodynamic Models

This article investigates the problem of detection and isolation of attacks on a water distribution network comprised of cascaded canal pools. The proposed approach employs a bank of delay-differential observer systems. The observers are based on an analytically approximate model of canal hydrodynamics. Each observer is insensitive to one fault/attack mode and sensitive to other modes. Design o...

متن کامل

Distributed Unknown-Input-Observers for Cyber Attack Detection and Isolation in Formation Flying UAVs

In this paper, cyber attack detection and isolation is studied on a network of UAVs in a formation flying setup. As the UAVs communicate to reach consensus on their states while making the formation, the communication network among the UAVs makes them vulnerable to a potential attack from malicious adversaries. Two types of attacks pertinent to a network of UAVs have been considered: a node att...

متن کامل

Deception in defense of computer systems from cyber-attack

While computer systems can be quite susceptible to deception by attackers, deception by defenders has increasingly been investigated in recent years. Military history has classic examples of defensive deceptions, but not all tactics and strategies have analogies in cyberspace. Honeypots are the most important example today; they are decoy computer systems designed to encourage attacks to collec...

متن کامل

A Stochastic Cyber-Attack Detection Scheme for Stochastic Control Systems Based on Frequency-Domain Transformation Technique

Based on frequency-domain transformation technique, this paper proposes an attack detection scheme for stochastic control systems under stochastic cyber-attacks and disturbances. The focus is on designing an anomaly detector for the stochastic control systems. First, we construct a model of stochastic control system with stochastic cyber-attacks which satisfy the Markovian stochastic process. A...

متن کامل

Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space

The concepts of deception, counter-deception, and deception detection in the cyber-space domain have been the subject of little systematic analysis. Our objective was to conduct scientometric analyses of these concepts in the cyber-space domain. We observed the following: Although various deceptive tactics are addressed in the cyber-security literature, it appears they are characterized more fr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014