TY - GEN
T1 - Using deception to shield cyberspace sensors
AU - Rice, Mason
AU - Guernsey, Daniel
AU - Shenoi, Sujeet
N1 - Publisher Copyright:
© IFIP International Federation for Information Processing 2011.
PY - 2011
Y1 - 2011
N2 - The U.S. President’s Comprehensive National Cybersecurity Initiative calls for the deployment of sensors to help protect federal enterprise networks. Because of the reported cyber intrusions into America’s electric power grid and other utilities, there is the possibility that sensors could also be positioned in key privately-owned infrastructure assets and the associated cyberspace. Sensors provide situational awareness of adversary operations, but acting directly on the collected information can reveal key sensor attributes such as modality, location, range, sensitivity and credibility. The challenge is to preserve the secrecy of sensors and their attributes while providing defenders with the freedom to respond to the adversary’s operations. This paper presents a framework for using deception to shield cyberspace sensors. The purpose of deception is to degrade the accuracy of the adversary’s beliefs regarding the sensors, give the adversary a false sense of completeness, and/or cause the adversary to question the available information. The paper describes several sensor shielding tactics, plays and enabling methods, along with the potential pitfalls. Wellexecuted and nuanced deception with regard to the deployment and use of sensors can help a defender gain tactical and strategic superiority in cyberspace.
AB - The U.S. President’s Comprehensive National Cybersecurity Initiative calls for the deployment of sensors to help protect federal enterprise networks. Because of the reported cyber intrusions into America’s electric power grid and other utilities, there is the possibility that sensors could also be positioned in key privately-owned infrastructure assets and the associated cyberspace. Sensors provide situational awareness of adversary operations, but acting directly on the collected information can reveal key sensor attributes such as modality, location, range, sensitivity and credibility. The challenge is to preserve the secrecy of sensors and their attributes while providing defenders with the freedom to respond to the adversary’s operations. This paper presents a framework for using deception to shield cyberspace sensors. The purpose of deception is to degrade the accuracy of the adversary’s beliefs regarding the sensors, give the adversary a false sense of completeness, and/or cause the adversary to question the available information. The paper describes several sensor shielding tactics, plays and enabling methods, along with the potential pitfalls. Wellexecuted and nuanced deception with regard to the deployment and use of sensors can help a defender gain tactical and strategic superiority in cyberspace.
KW - Cyberspace sensors
KW - Deception
KW - Sensor shielding
UR - http://www.scopus.com/inward/record.url?scp=84905228440&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-24864-1_1
DO - 10.1007/978-3-642-24864-1_1
M3 - Conference contribution
AN - SCOPUS:84905228440
SN - 9783642248634
T3 - IFIP Advances in Information and Communication Technology
SP - 3
EP - 18
BT - Critical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Revised Selected Papers
A2 - Butts, Jonathan
A2 - Shenoi, Sujeet
PB - Springer New York LLC
T2 - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011
Y2 - 23 March 2011 through 25 March 2011
ER -