Muutke küpsiste eelistusi

Introduction to Cyberdeception 1st ed. 2016 [Kõva köide]

  • Formaat: Hardback, 334 pages, kõrgus x laius: 235x155 mm, kaal: 6447 g, 49 Illustrations, color; 12 Illustrations, black and white; XIV, 334 p. 61 illus., 49 illus. in color., 1 Hardback
  • Ilmumisaeg: 04-Oct-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319411853
  • ISBN-13: 9783319411859
  • Kõva köide
  • Hind: 67,23 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 79,09 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Hardback, 334 pages, kõrgus x laius: 235x155 mm, kaal: 6447 g, 49 Illustrations, color; 12 Illustrations, black and white; XIV, 334 p. 61 illus., 49 illus. in color., 1 Hardback
  • Ilmumisaeg: 04-Oct-2016
  • Kirjastus: Springer International Publishing AG
  • ISBN-10: 3319411853
  • ISBN-13: 9783319411859
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability

and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems. 

Introduction.- Psychology of Deception.- Professional Deception.- Deception Methods for Defense.- Deception Methods for Offense.- Delays.- Fakes.- Defensive Camouflage.- False Excuses.- Defensive Social Engineering.- Measuring Deception.- Planning Cyberspace Deception.- Software Engineering of Deceptive Software and Systems.- Decoy I/O Devices.- Deception for the Electrical Power Industry.- Law and Ethics for Software Deception.

Arvustused

The purpose of this book is both to provide a systematic overview of cyberdeception and also to provide a study guide for all readers. young researchers, managers, and anyone interested in the problem of cyberdeception will find in this book a great opportunity to learn about the topic. I highly recommend this book for anyone who is looking for an engaging and reader-friendly introduction to cyberdeception. (Eugen Petac, Computing Reviews, April, 2017)

1 Introduction
1(8)
1.1 Deception as a Third Line of Defense
2(1)
1.2 Terminology
3(1)
1.3 Why Deceive in Cyberspace?
3(1)
1.4 Goals of Cyberdeception
4(1)
1.5 Deception Occurs Everywhere
5(1)
1.6 Are You Overconfident About Being Fooled?
6(1)
1.7 Is Deception Ethical?
6(1)
1.8 Plan of the Book
7(2)
References
8(1)
2 Psychology of Deception
9(16)
2.1 Definitions of Deception
9(1)
2.2 The Spectrum of Deception
10(1)
2.3 The Sociology of Trust
11(1)
2.4 Detecting Deception
12(3)
2.5 Other Factors in Designing Good Deceptions
15(5)
2.5.1 Providing Independent Evidence
15(1)
2.5.2 Consistency
16(1)
2.5.3 Deception by Commission Versus Deception by Omission
16(1)
2.5.4 Confirmability of a Deception
17(1)
2.5.5 Cognitive Limitations
17(1)
2.5.6 Emotional Manipulation
18(1)
2.5.7 Active Methods of Detecting Deception
18(1)
2.5.8 Individual Differences in Susceptibility to Deception
18(2)
2.5.9 Exploiting Self-Deception
20(1)
2.5.10 Groupthink
20(1)
2.6 Conclusions
20(1)
2.7 Exercises
21(4)
References
22(3)
3 Professional Deception
25(14)
3.1 Military Deception
26(4)
3.1.1 The Role of Deception in Military Activities
27(1)
3.1.2 Principles of Military Deception
28(1)
3.1.3 Counterintelligence
29(1)
3.2 Stage Magic
30(4)
3.2.1 Practices of Stage Magic
30(2)
3.2.2 The Importance of a Narrative
32(1)
3.2.3 Psychology for Magic
33(1)
3.2.4 Minimization of Deception
33(1)
3.3 Marketing
34(3)
3.3.1 Types of Marketing and Their Deceptions
34(1)
3.3.2 Deceptive Marketing in Cyberspace
35(1)
3.3.3 Deception with Software Marketing
36(1)
3.4 Conclusions
37(1)
3.5 Exercises
37(2)
References
38(1)
4 Deception Methods for Defense
39(16)
4.1 Classic Deception Taxonomies
40(1)
4.2 Military Taxonomies
40(2)
4.3 A Taxonomy from Linguistic Case Theory
42(6)
4.3.1 Linguistic-Case Deception Categories
42(2)
4.3.2 Examples of the Deception Cases
44(1)
4.3.3 Rating the Case-Grammar Defensive Deception Methods for Defense
45(3)
4.3.4 An Example Putting the Deceptions Together
48(1)
4.4 Second-Order Deceptions
48(1)
4.5 Resource Deception
49(1)
4.6 Deception Presentation Tactics
50(1)
4.7 Conclusions
51(1)
4.8 Exercises
51(4)
References
52(3)
5 Deception Methods for Offense
55(8)
5.1 Motivation for Offensive Deception
56(1)
5.2 The Options in Offensive Deception
56(3)
5.3 Applying the Deception Taxonomy to Offense
59(2)
5.4 The Ethics of Offensive Deception
61(1)
5.5 Conclusions
61(1)
5.6 Exercises
61(2)
References
62(1)
6 Delays
63(12)
6.1 Why Delay Defensively?
64(1)
6.2 Delaying Tactics
65(1)
6.3 How Much to Delay
66(2)
6.4 Example: Delays in a Web Portal
68(2)
6.5 Unpredictable Delays
70(1)
6.6 Cascading Delays
70(1)
6.7 The Spectrum of Delays
71(1)
6.8 Other Forms of Time Manipulation
72(1)
6.9 Conclusions
72(1)
6.10 Exercises
72(3)
References
73(2)
7 Fakes
75(22)
7.1 Other Possible Cyber-Fakes
76(1)
7.2 A Grammar for Random Error Messages
77(1)
7.3 A Stochastic Grammar for Directories
78(5)
7.4 Building a Stochastic Grammar
83(2)
7.5 Detail-Changing Tactics
85(1)
7.6 Fighting Spam and Phishing with Fakes
86(1)
7.7 Fake Software
87(1)
7.8 Fake File Systems
87(3)
7.9 Distribution of Fake Documents
90(1)
7.10 Other Useful Fakes
91(2)
7.11 Dynamic Fakes with Packet Manipulation
93(1)
7.12 Inducing Paranoia
93(1)
7.13 Conclusions
94(1)
7.14 Exercises
94(3)
References
95(2)
8 Defensive Camouflage
97(8)
8.1 Hiding a Honeypot
97(2)
8.2 Disguising the Operating Systems and Networks
99(1)
8.3 Concealing Patches
100(1)
8.4 Covert Channels and Steganography
100(1)
8.5 Other Anti-Forensics Techniques
101(1)
8.6 Conclusions
102(1)
8.7 Exercises
102(3)
References
104(1)
9 False Excuses
105(16)
9.1 The Philosophy of Excuses
106(1)
9.2 Types of False Excuses
107(2)
9.3 Ensuring Logically Consistent Excuses
109(5)
9.3.1 A Consistency Example
109(1)
9.3.2 Generalizing Consistency Analysis
110(1)
9.3.3 Inferences of Resource Facets
111(3)
9.3.4 Implementing Excuse Checking
114(1)
9.4 Rating Excuses
114(3)
9.4.1 Prior Rate of an Excuse
115(1)
9.4.2 Relaxing Consistency Over Time
115(2)
9.4.3 Consistency Between Sessions
117(1)
9.4.4 Putting Together the Rating Factors
117(1)
9.5 Conclusions
117(1)
9.6 Exercises
117(4)
References
118(3)
10 Defensive Social Engineering
121(12)
10.1 Tactics and Plans for Social-Engineering Deceptions
122(1)
10.2 Techniques to Increase Likelihood of Accepting the Scam
123(2)
10.3 Bait
125(1)
10.4 More About Spyware
126(1)
10.5 Reputation Scams
127(1)
10.6 Hoaxes
127(1)
10.7 Bureaucratic Games
128(1)
10.8 Strategic Deception
129(1)
10.9 Conclusions
130(1)
10.10 Exercises
130(3)
References
130(3)
11 Measuring Deception
133(28)
11.1 Misuse Detection
134(2)
11.2 Anomaly Detection
136(3)
11.2.1 Anomaly Detection of Insider Threats
138(1)
11.3 Bayesian Inference
139(5)
11.3.1 Naive Bayes Inference
140(1)
11.3.2 Examples of Naive Bayes Inference
141(1)
11.3.3 Obtaining Necessary Probabilities
142(1)
11.3.4 Weighted Bayesian Inference
143(1)
11.4 Coordinated Detection of Attackers
144(1)
11.5 More About Deception Detection
145(1)
11.6 Active Deception Detection with Probing
146(1)
11.7 The Asymmetry of Trust and Distrust
147(1)
11.8 More About Building Good Honeypots
147(7)
11.8.1 Experiments with Detection of Manipulated Data
148(1)
11.8.2 Building a Convincing Honeypot
149(1)
11.8.3 Metadata of Typical File Systems
149(5)
11.9 Clues to Deception in a File System
154(1)
11.10 Conclusions
155(1)
11.11 Exercises
155(6)
References
158(3)
12 Planning Cyberspace Deception
161(28)
12.1 Cost-Benefit Analysis of Deception
161(8)
12.1.1 Analysis of a Single Defensive Deception
162(2)
12.1.2 Analysis of Two-Stage Offensive Deception
164(2)
12.1.3 Analysis of Two-Stage Defensive Deception
166(1)
12.1.4 Analysis of a Fake Honeypot
167(2)
12.2 Analysis of Propagation of Deceptions
169(1)
12.3 Quantifying Tactics from the Deception Taxonomies
170(1)
12.4 Counterplanning Against Attacks with Deception
171(12)
12.4.1 Attack Plans
172(4)
12.4.2 Tracking Attack Plans
176(1)
12.4.3 Ploys for Counterplans
177(2)
12.4.4 Greedy Counterplanning
179(1)
12.4.5 Planning Multiple Deceptions
180(1)
12.4.6 Ploy Presentation
181(1)
12.4.7 Entropy Measurement of Deceptions
182(1)
12.5 Conclusions
183(1)
12.6 Exercises
183(6)
References
186(3)
13 Software Engineering of Deceptive Software and Systems
189(26)
13.1 Experimental deception
190(1)
13.2 Deception architectures
190(2)
13.3 Defensive Deceptive Firewalls
192(2)
13.4 Low-Interaction Honeypots
194(8)
13.4.1 Overview
194(1)
13.4.2 Case Study: The Honeyd Honeypot Tool
195(3)
13.4.3 Case Study: A Deceptive Web Server with Honeyd
198(1)
13.4.4 Case Study: A Deceptive Web Server with Glastopf
199(3)
13.5 Implementing Simple Deceptions in Full-Interaction Honeypots
202(3)
13.6 Server and Spam Honeypots
205(1)
13.7 Honeypots Attacking Other Machines
205(1)
13.8 Strategies for Deception Implementation
206(5)
13.8.1 Hand-Coded Deceptions
206(1)
13.8.2 Software Instrumentation with Wrappers
206(2)
13.8.3 Deception Control Policies
208(1)
13.8.4 Virtualization and Redirection
209(1)
13.8.5 Deceptions in Hardware
210(1)
13.9 Conclusions
211(1)
13.10 Exercises
211(4)
References
212(3)
14 Decoy I/O Devices
215(16)
14.1 Motivation
216(1)
14.2 Design Issues for Fake I/O Devices
216(7)
14.2.1 Design details
217(3)
14.2.2 Tactics for Decoy Devices
220(1)
14.2.3 Hardware Support for Decoy Devices
221(1)
14.2.4 Tracking Down Malicious Activity
222(1)
14.3 Case Study: Decoy Network Interface Controller
223(5)
14.3.1 Anti-Malware Testing
223(1)
14.3.2 Results of Testing
224(2)
14.3.3 More About Coexistence with Real NICs
226(2)
14.4 Conclusions
228(1)
14.5 Exercises
228(3)
References
229(2)
15 Deception for the Electrical Power Industry
231(10)
15.1 Simulating Electrical Power Plants
232(1)
15.2 Building a Power-Plant Simulator
232(1)
15.3 Mirage Architecture
233(2)
15.4 Defense of Electrical Substations
235(1)
15.4.1 Defensive Deception for Electrical Substations
235(1)
15.5 Deception Engineering for a Real Example of Malware
236(2)
15.5.1 Operation of Havex
236(1)
15.5.2 Experiments with Havex
237(1)
15.6 Conclusions
238(1)
15.7 Exercises
238(3)
References
239(2)
16 Law and Ethics for Software Deception
241(10)
16.1 Applying Ethics to Cyberspace
241(4)
16.1.1 Ethical-Climate Issues
243(1)
16.1.2 Escalation of Distrust
243(1)
16.1.3 Ensuring Minimal Harms
244(1)
16.1.4 Privacy
244(1)
16.1.5 Entrapment
245(1)
16.1.6 Trespassing
245(1)
16.1.7 Strategic Deception
245(1)
16.2 Legal Issues in Deception
245(3)
16.2.1 Fraud
246(1)
16.2.2 Entrapment
246(1)
16.2.3 Retaliation
247(1)
16.2.4 International Law on Cyberattacks
247(1)
16.3 Conclusions
248(1)
16.4 Exercises
248(3)
References
249(2)
Chapter Photographs 251(2)
Appendix A Fake Directory Generator 253(14)
Appendix B Stochastic String Generator 267(6)
Appendix C Resource-Deception Consistency Checker 273(10)
Appendix D Rootkit Attack Planner 283(36)
Appendix E Counterplanner for Attacks 319
Neil C. Rowe is Professor of Computer Science at the U.S. Naval Postgraduate School where he has been since 1983.  He has a Ph.D. in Computer Science from Stanford University (1983).  His main research interests are in data mining, digital forensics, modeling of deception, and cyberwarfare. Julian Rrushi is an assistant professor with the Department of Computer Science at Western Washington University, Bellingham, WA. He received a PhD in computer science from the University of Milan in 2009. His research is on cyber security, and includes work on industrial control systems. He worked for several years in industry as a vulnerability researcher before accepting a faculty appointment with Western Washington University.