Table of contentsTitle slide
Outline
Background
Deception in Information Protection
Historical Examples
Human Deception
Steganography
Deception in Warfare
Mode D in War
Deception: A Tool for Cyber Warfare
Deceptive Defense Examples
Recent IT Deceptions
Deceptive Defense Properties
Honey Pot Systems
The Original Deception ToolKit
Deception Toolkit Example
Other DTK actions
New Innovation #1 Multiple Deceptions in One Box Even though it looks like a lot of deception boxes they all operate in a single PC and appear to be different
New Innovation # 2 Multiple Address Translations Addresses are translated multiple times to allow deception networks to be separated from normal networks, to allow 'real' machines to replace low fidelity deceptions, and to allow increased indirection & obscurity
Two Translation Designs
Ridlr
The HoneyNet Project
Some Other Deceptive Cyber Defenses
Cognitive Models of Deception
Cognitive Models
Slide 26
Deception Levels
Human Deception Levels
Slide 29
Dissapearing Elephant
Observation Limits
Example: Deceptive Authentication
Deception Techniques by level - High level
Human Perception Limits
Deception Techniques by LEvel - Group Level
Social Pressure
Karrass Persuasion Model
Example of influence tactic
PM DCA Example
Roving Gang Example
Deception Techniques by Level - Mixed LEvel
Command stress and deceptions
Battle of the Bulge
Normandy Invasion
Suez Canal Surprise
What we don't know about deception
Applying Deception to Information Protection
Some applications of cognitive deception
Low-level Examples
Cognitive Model of Computers
Cognitive Model of Computer Deceptions
Exploiting computer cognition
A Simple Computer Deception
Deception in System of Systems
A user and computer
Cell phone listening deception
A Small Network with a Firewall
The Antivirus Covert Channel
Experiments
Experiments to date
Experimental configuration
What the target knows
Experiment 1
Hop 1 Diagram
Hop 1 Real Setup
Experiment 1 Attack Graph
Experiment 1 Results
Experiment 2
Experiment 2 Attack Graph
Experiment 2 Results
Experiment 3
Experiment 3 Attack Graph
Experiment 3 Results
Experiment 3
Presented Hop4 Disgram
Experiment 4 Attack Graph
Experiment 4 Results
Experiment 5 Results
Experiment 6 Results
OVerall Experimental Results
Other Effects
Thank You
|