Title :
Counterplanning deceptions to foil cyber-attack plans
Author_Institution :
Cebrowski Inst. for Inf. Innovation & Inf. Superiority & Comput. Sci. Dept., Naval Postgraduate Sch., Monterey, CA, USA
Abstract :
Tactics involving deception are important in military strategies. We have been exploring deliberate deception in defensive tactics by information systems under cyber-attack as during information warfare. We have developed a tool to systematically "counterplan" or find ways to foil a particular attack plan. Our approach is to first find all possible atomic "ploys" that can interfere with the plan. Ploys are simple deceits the operating system can do such as lying about the status of a file. We analyze ploys as to the degree of difficulty they cause to the plan wherever they can be applied. We then formulate a "counterplan" by selecting the most cost-effective set of ploys and assign appropriate presentation methods for them, taking into account the likelihood that, if we are not careful, the attacker will realize they are being deceived and terminate our game with them. The counterplan can be effected by a modified operating system. We have implemented our counterplanner in a tool MECOUNTER that uses multiagent planning coupled with some novel inference methods to efficiently find a best counterplan. We apply the tool to an example of a rootkit-installation plan and discuss the results.
Keywords :
computer crime; decision theory; inference mechanisms; information systems; military computing; multi-agent systems; operating systems (computers); planning (artificial intelligence); stochastic processes; MECOUNTER tool; atomic ploys; counterplanning; cyber-attack plans; decision theory; defensive tactics; information warfare; intelligent agents; military strategies; multiagent planning; operating system; stochastic models; tactical deception; toolkit-installation plan; Access control; Computer hacking; Decision theory; Displays; Information systems; Inspection; Intelligent agent; Operating systems; Stochastic processes; Technological innovation;
Conference_Titel :
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
Print_ISBN :
0-7803-7808-3
DOI :
10.1109/SMCSIA.2003.1232422