Using deception to shield cyberspace sensors

Mason Rice, Daniel Guernsey, Sujeet Shenoi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

The U.S. President’s Comprehensive National Cybersecurity Initiative calls for the deployment of sensors to help protect federal enterprise networks. Because of the reported cyber intrusions into America’s electric power grid and other utilities, there is the possibility that sensors could also be positioned in key privately-owned infrastructure assets and the associated cyberspace. Sensors provide situational awareness of adversary operations, but acting directly on the collected information can reveal key sensor attributes such as modality, location, range, sensitivity and credibility. The challenge is to preserve the secrecy of sensors and their attributes while providing defenders with the freedom to respond to the adversary’s operations. This paper presents a framework for using deception to shield cyberspace sensors. The purpose of deception is to degrade the accuracy of the adversary’s beliefs regarding the sensors, give the adversary a false sense of completeness, and/or cause the adversary to question the available information. The paper describes several sensor shielding tactics, plays and enabling methods, along with the potential pitfalls. Wellexecuted and nuanced deception with regard to the deployment and use of sensors can help a defender gain tactical and strategic superiority in cyberspace.

Original languageEnglish
Title of host publicationCritical Infrastructure Protection V - 5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011, Revised Selected Papers
EditorsJonathan Butts, Sujeet Shenoi
PublisherSpringer New York LLC
Pages3-18
Number of pages16
ISBN (Print)9783642248634
DOIs
StatePublished - 2011
Externally publishedYes
Event5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011 - Hanover, United States
Duration: Mar 23 2011Mar 25 2011

Publication series

NameIFIP Advances in Information and Communication Technology
Volume367
ISSN (Print)1868-4238
ISSN (Electronic)1868-422X

Conference

Conference5th IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2011
Country/TerritoryUnited States
CityHanover
Period03/23/1103/25/11

Keywords

  • Cyberspace sensors
  • Deception
  • Sensor shielding

Fingerprint

Dive into the research topics of 'Using deception to shield cyberspace sensors'. Together they form a unique fingerprint.

Cite this