Looking from the hacker's perspective: Role of deceptive strategies in cyber security

Palvi Aggarwal, Cleotilde González, V. Dutt
{"title":"Looking from the hacker's perspective: Role of deceptive strategies in cyber security","authors":"Palvi Aggarwal, Cleotilde González, V. Dutt","doi":"10.1109/CyberSA.2016.7503288","DOIUrl":null,"url":null,"abstract":"Cyber-attacks are increasing in the real-world and they cause widespread damage to cyber-infrastructure and loss of information. Deception, i.e., the act of making someone believe something that is not true, could be a way of countering cyber-attacks. In this paper, we propose a deception game, which we used to evaluate the decision-making of a hacker in the presence of deception. In an experiment, using the deception game, we analyzed the effect of two between-subjects factors (N = 100 participants): Amount of deception (high and low) and the timing of deception (early and late). Results revealed that use of early deception made hackers trust the system's response and get deceived. However, the amount of deception did not influence hacker's trust on the system's response. In addition, use of a deceptive strategy, i.e., when hackers moved from deception rounds to non-deception rounds, caused hackers to get deceived and not attack the system.","PeriodicalId":179031,"journal":{"name":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CyberSA.2016.7503288","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Cyber-attacks are increasing in the real-world and they cause widespread damage to cyber-infrastructure and loss of information. Deception, i.e., the act of making someone believe something that is not true, could be a way of countering cyber-attacks. In this paper, we propose a deception game, which we used to evaluate the decision-making of a hacker in the presence of deception. In an experiment, using the deception game, we analyzed the effect of two between-subjects factors (N = 100 participants): Amount of deception (high and low) and the timing of deception (early and late). Results revealed that use of early deception made hackers trust the system's response and get deceived. However, the amount of deception did not influence hacker's trust on the system's response. In addition, use of a deceptive strategy, i.e., when hackers moved from deception rounds to non-deception rounds, caused hackers to get deceived and not attack the system.
从黑客的角度看:欺骗策略在网络安全中的作用
网络攻击在现实世界中日益增多,对网络基础设施造成广泛破坏和信息丢失。欺骗,即让某人相信不真实的事情,可能是对抗网络攻击的一种方式。在本文中,我们提出了一个欺骗博弈,用来评估黑客在存在欺骗的情况下的决策。在实验中,我们利用欺骗游戏分析了欺骗量(高和低)和欺骗时间(早和晚)两个被试间因素(N = 100)的影响。结果显示,使用早期欺骗使黑客相信系统的反应并被欺骗。然而,欺骗的数量并没有影响黑客对系统响应的信任。此外,使用欺骗策略,即当黑客从欺骗轮移动到非欺骗轮时,导致黑客被欺骗而不攻击系统。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信