2020
DOI: 10.24251/hicss.2020.226
|View full text |Cite
|
Sign up to set email alerts
|

Design of Dynamic and Personalized Deception: A Research Framework and New Insights

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
20
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(20 citation statements)
references
References 0 publications
0
20
0
Order By: Relevance
“…Cyber attackers use deception in the form of phishing emails, fake websites and malware, social engineering, misinformation campaigns, and so on. Defenders also employ deception using tactics such as honeypots, which are “fake” nodes in a network designed to appear attractive to attackers (Gonzalez, Aggarwal, Cranford, & Lebiere, 2020). In these examples, only a few verbal cues may be leaked through text (especially so for phishing emails and other deceptions involving text or dialogue), and nonverbal cues only include inconsistent interactions with technology (e.g., the system responds too fast/slow; Rowe & Rrushi, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…Cyber attackers use deception in the form of phishing emails, fake websites and malware, social engineering, misinformation campaigns, and so on. Defenders also employ deception using tactics such as honeypots, which are “fake” nodes in a network designed to appear attractive to attackers (Gonzalez, Aggarwal, Cranford, & Lebiere, 2020). In these examples, only a few verbal cues may be leaked through text (especially so for phishing emails and other deceptions involving text or dialogue), and nonverbal cues only include inconsistent interactions with technology (e.g., the system responds too fast/slow; Rowe & Rrushi, 2016).…”
Section: Introductionmentioning
confidence: 99%
“…As Shade et al [15] have pointed out, most research on cyber deception tools tends to focus on honeypots [16], suggesting ways to improve them [17], deliver them as a service [18], or to recognise their deficiencies [18], [19]. Where cyber deception research extends beyond honeypots it still tends to build from a computer science or engineering perspective [18], [19], [20], [21] with a smaller number of examples of research that include the impact of humans on cyber deception through, 'cognitive models and experimental games' [22] and 'computational models of human cognition' [20]. The assumption in such research is one of rational decision-making with a focus on formal rules or models in how decisions are made [23].…”
Section: Background and Related Workmentioning
confidence: 99%
“…The assumption in such research is one of rational decision-making with a focus on formal rules or models in how decisions are made [23]. As cyber deception research has highlighted, however, we also need to understand the cognitive and behavioural processes of both the attacker and defender to improve cyber deception [22], [24], [25].…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To further address the weakness of peSSE, Gonzalez, Aggarwal, Cranford, and Lebiere (2020) proposed a research framework for dynamic, adaptive, and personalized deception for cyber defense. This framework implements SSG algorithms for distribution of limited defense resources with signaling theory (e.g., peSSE) to gain insights about human behavior from human‐in‐the‐loop experiments, and cognitive modeling using instance‐based learning theory (IBLT) to create personalized defense algorithms.…”
Section: Deceptive Signaling For Cybersecuritymentioning
confidence: 99%