Deception in Defense of Information Systems


Click here to start

Table of contents

Title slide

Outline

Background

Deception in Information Protection

Historical Examples

Human Deception

Steganography

Deception in Warfare

Mode D in War

Deception: A Tool for Cyber Warfare

Deceptive Defense Examples

Recent IT Deceptions

Deceptive Defense Properties

Honey Pot Systems

The Original Deception ToolKit

Deception Toolkit Example

Other DTK actions

New Innovation #1 Multiple Deceptions in One Box Even though it looks like a lot of deception boxes they all operate in a single PC and appear to be different

New Innovation # 2 Multiple Address Translations Addresses are translated multiple times to allow deception networks to be separated from normal networks, to allow 'real' machines to replace low fidelity deceptions, and to allow increased indirection & obscurity

Two Translation Designs

Ridlr

The HoneyNet Project

Some Other Deceptive Cyber Defenses

Cognitive Models of Deception

Cognitive Models

Slide 26

Deception Levels

Human Deception Levels

Slide 29

Dissapearing Elephant

Observation Limits

Example: Deceptive Authentication

Deception Techniques by level - High level

Human Perception Limits

Deception Techniques by LEvel - Group Level

Social Pressure

Karrass Persuasion Model

Example of influence tactic

PM DCA Example

Roving Gang Example

Deception Techniques by Level - Mixed LEvel

Command stress and deceptions

Battle of the Bulge

Normandy Invasion

Suez Canal Surprise

What we don't know about deception

Applying Deception to Information Protection

Some applications of cognitive deception

Low-level Examples

Cognitive Model of Computers

Cognitive Model of Computer Deceptions

Exploiting computer cognition

A Simple Computer Deception

Deception in System of Systems

A user and computer

Cell phone listening deception

A Small Network with a Firewall

The Antivirus Covert Channel

Experiments

Experiments to date

Experimental configuration

What the target knows

Experiment 1

Hop 1 Diagram

Hop 1 Real Setup

Experiment 1 Attack Graph

Experiment 1 Results

Experiment 2

Experiment 2 Attack Graph

Experiment 2 Results

Experiment 3

Experiment 3 Attack Graph

Experiment 3 Results

Experiment 3

Presented Hop4 Disgram

Experiment 4 Attack Graph

Experiment 4 Results

Experiment 5 Results

Experiment 6 Results

OVerall Experimental Results

Other Effects

Thank You

Author: Fred Cohen

E-mail: fc@all.net

Best viewed with
StarOffice