Proceedings 26th Annual International Computer Software and Applications
DOI: 10.1109/cmpsac.2002.1045129
|View full text |Cite
|
Sign up to set email alerts
|

On the response policy of software decoys: Conducting software-based deception in the cyber battlespace

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 4 publications
0
7
0
Order By: Relevance
“…Applying a one-size-fits-all response, such as always terminating all interaction with the intruder, or always responding in kind, can be an ineffective or worse, illegal, response. For instance, terminating interaction with an intruder could prevent the seizure of evidence for criminal prosecution, collection of information for counterintelligence purposes, or counter-targeting for a military response (Michael, 2002). By responding in kind, the defender may violate domestic or international law or, in the case of a government actor, inadvertently escalate to the level of a use of force or even an armed attack.…”
Section: Introductionmentioning
confidence: 99%
“…Applying a one-size-fits-all response, such as always terminating all interaction with the intruder, or always responding in kind, can be an ineffective or worse, illegal, response. For instance, terminating interaction with an intruder could prevent the seizure of evidence for criminal prosecution, collection of information for counterintelligence purposes, or counter-targeting for a military response (Michael, 2002). By responding in kind, the defender may violate domestic or international law or, in the case of a government actor, inadvertently escalate to the level of a use of force or even an armed attack.…”
Section: Introductionmentioning
confidence: 99%
“…When the suspect program interacts with other processes on the VM, the analyst can alter the way the processes act so as to present a VM with multiple inconsistent configurations. Numerous studies have reported on the use of deception as a defensive mechanism [13,14,15,16,17]. The use of virtual machine eliminates the need for host-based deception to use a modified kernel and modified software.…”
Section: Vmi Covert Operationsmentioning
confidence: 99%
“…We refer to this as an example of Ullintelltiollal unlal1;ful use of decoys. One means proposed in [2] for countering this and the other types of misuse is to make the decoy supervisors responsible for checking whether the rules for conducting counterintelligence and applying countermeasures in a particular context do not contravene policy.…”
Section: Potential For Misuse Of Decoysmentioning
confidence: 99%
“…Such outlawed means include chemical weapons, biological weapons, x-ray transparent bullets, and blinding lasers. These four customary rules, described as they pertain to military use of software decoys to protect semantic webs, may be found in [2].…”
Section: Principled Analysis Of Decoy Usagementioning
confidence: 99%