|
|
1 | (8) |
|
1.1 Deception as a Third Line of Defense |
|
|
2 | (1) |
|
|
3 | (1) |
|
1.3 Why Deceive in Cyberspace? |
|
|
3 | (1) |
|
1.4 Goals of Cyberdeception |
|
|
4 | (1) |
|
1.5 Deception Occurs Everywhere |
|
|
5 | (1) |
|
1.6 Are You Overconfident About Being Fooled? |
|
|
6 | (1) |
|
1.7 Is Deception Ethical? |
|
|
6 | (1) |
|
|
7 | (2) |
|
|
8 | (1) |
|
2 Psychology of Deception |
|
|
9 | (16) |
|
2.1 Definitions of Deception |
|
|
9 | (1) |
|
2.2 The Spectrum of Deception |
|
|
10 | (1) |
|
2.3 The Sociology of Trust |
|
|
11 | (1) |
|
|
12 | (3) |
|
2.5 Other Factors in Designing Good Deceptions |
|
|
15 | (5) |
|
2.5.1 Providing Independent Evidence |
|
|
15 | (1) |
|
|
16 | (1) |
|
2.5.3 Deception by Commission Versus Deception by Omission |
|
|
16 | (1) |
|
2.5.4 Confirmability of a Deception |
|
|
17 | (1) |
|
2.5.5 Cognitive Limitations |
|
|
17 | (1) |
|
2.5.6 Emotional Manipulation |
|
|
18 | (1) |
|
2.5.7 Active Methods of Detecting Deception |
|
|
18 | (1) |
|
2.5.8 Individual Differences in Susceptibility to Deception |
|
|
18 | (2) |
|
2.5.9 Exploiting Self-Deception |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
|
21 | (4) |
|
|
22 | (3) |
|
|
25 | (14) |
|
|
26 | (4) |
|
3.1.1 The Role of Deception in Military Activities |
|
|
27 | (1) |
|
3.1.2 Principles of Military Deception |
|
|
28 | (1) |
|
3.1.3 Counterintelligence |
|
|
29 | (1) |
|
|
30 | (4) |
|
3.2.1 Practices of Stage Magic |
|
|
30 | (2) |
|
3.2.2 The Importance of a Narrative |
|
|
32 | (1) |
|
3.2.3 Psychology for Magic |
|
|
33 | (1) |
|
3.2.4 Minimization of Deception |
|
|
33 | (1) |
|
|
34 | (3) |
|
3.3.1 Types of Marketing and Their Deceptions |
|
|
34 | (1) |
|
3.3.2 Deceptive Marketing in Cyberspace |
|
|
35 | (1) |
|
3.3.3 Deception with Software Marketing |
|
|
36 | (1) |
|
|
37 | (1) |
|
|
37 | (2) |
|
|
38 | (1) |
|
4 Deception Methods for Defense |
|
|
39 | (16) |
|
4.1 Classic Deception Taxonomies |
|
|
40 | (1) |
|
|
40 | (2) |
|
4.3 A Taxonomy from Linguistic Case Theory |
|
|
42 | (6) |
|
4.3.1 Linguistic-Case Deception Categories |
|
|
42 | (2) |
|
4.3.2 Examples of the Deception Cases |
|
|
44 | (1) |
|
4.3.3 Rating the Case-Grammar Defensive Deception Methods for Defense |
|
|
45 | (3) |
|
4.3.4 An Example Putting the Deceptions Together |
|
|
48 | (1) |
|
4.4 Second-Order Deceptions |
|
|
48 | (1) |
|
|
49 | (1) |
|
4.6 Deception Presentation Tactics |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (4) |
|
|
52 | (3) |
|
5 Deception Methods for Offense |
|
|
55 | (8) |
|
5.1 Motivation for Offensive Deception |
|
|
56 | (1) |
|
5.2 The Options in Offensive Deception |
|
|
56 | (3) |
|
5.3 Applying the Deception Taxonomy to Offense |
|
|
59 | (2) |
|
5.4 The Ethics of Offensive Deception |
|
|
61 | (1) |
|
|
61 | (1) |
|
|
61 | (2) |
|
|
62 | (1) |
|
|
63 | (12) |
|
6.1 Why Delay Defensively? |
|
|
64 | (1) |
|
|
65 | (1) |
|
|
66 | (2) |
|
6.4 Example: Delays in a Web Portal |
|
|
68 | (2) |
|
|
70 | (1) |
|
|
70 | (1) |
|
6.7 The Spectrum of Delays |
|
|
71 | (1) |
|
6.8 Other Forms of Time Manipulation |
|
|
72 | (1) |
|
|
72 | (1) |
|
|
72 | (3) |
|
|
73 | (2) |
|
|
75 | (22) |
|
7.1 Other Possible Cyber-Fakes |
|
|
76 | (1) |
|
7.2 A Grammar for Random Error Messages |
|
|
77 | (1) |
|
7.3 A Stochastic Grammar for Directories |
|
|
78 | (5) |
|
7.4 Building a Stochastic Grammar |
|
|
83 | (2) |
|
7.5 Detail-Changing Tactics |
|
|
85 | (1) |
|
7.6 Fighting Spam and Phishing with Fakes |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
87 | (3) |
|
7.9 Distribution of Fake Documents |
|
|
90 | (1) |
|
|
91 | (2) |
|
7.11 Dynamic Fakes with Packet Manipulation |
|
|
93 | (1) |
|
|
93 | (1) |
|
|
94 | (1) |
|
|
94 | (3) |
|
|
95 | (2) |
|
|
97 | (8) |
|
|
97 | (2) |
|
8.2 Disguising the Operating Systems and Networks |
|
|
99 | (1) |
|
|
100 | (1) |
|
8.4 Covert Channels and Steganography |
|
|
100 | (1) |
|
8.5 Other Anti-Forensics Techniques |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (3) |
|
|
104 | (1) |
|
|
105 | (16) |
|
9.1 The Philosophy of Excuses |
|
|
106 | (1) |
|
9.2 Types of False Excuses |
|
|
107 | (2) |
|
9.3 Ensuring Logically Consistent Excuses |
|
|
109 | (5) |
|
9.3.1 A Consistency Example |
|
|
109 | (1) |
|
9.3.2 Generalizing Consistency Analysis |
|
|
110 | (1) |
|
9.3.3 Inferences of Resource Facets |
|
|
111 | (3) |
|
9.3.4 Implementing Excuse Checking |
|
|
114 | (1) |
|
|
114 | (3) |
|
9.4.1 Prior Rate of an Excuse |
|
|
115 | (1) |
|
9.4.2 Relaxing Consistency Over Time |
|
|
115 | (2) |
|
9.4.3 Consistency Between Sessions |
|
|
117 | (1) |
|
9.4.4 Putting Together the Rating Factors |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
117 | (4) |
|
|
118 | (3) |
|
10 Defensive Social Engineering |
|
|
121 | (12) |
|
10.1 Tactics and Plans for Social-Engineering Deceptions |
|
|
122 | (1) |
|
10.2 Techniques to Increase Likelihood of Accepting the Scam |
|
|
123 | (2) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
130 | (1) |
|
|
130 | (3) |
|
|
130 | (3) |
|
|
133 | (28) |
|
|
134 | (2) |
|
|
136 | (3) |
|
11.2.1 Anomaly Detection of Insider Threats |
|
|
138 | (1) |
|
|
139 | (5) |
|
11.3.1 Naive Bayes Inference |
|
|
140 | (1) |
|
11.3.2 Examples of Naive Bayes Inference |
|
|
141 | (1) |
|
11.3.3 Obtaining Necessary Probabilities |
|
|
142 | (1) |
|
11.3.4 Weighted Bayesian Inference |
|
|
143 | (1) |
|
11.4 Coordinated Detection of Attackers |
|
|
144 | (1) |
|
11.5 More About Deception Detection |
|
|
145 | (1) |
|
11.6 Active Deception Detection with Probing |
|
|
146 | (1) |
|
11.7 The Asymmetry of Trust and Distrust |
|
|
147 | (1) |
|
11.8 More About Building Good Honeypots |
|
|
147 | (7) |
|
11.8.1 Experiments with Detection of Manipulated Data |
|
|
148 | (1) |
|
11.8.2 Building a Convincing Honeypot |
|
|
149 | (1) |
|
11.8.3 Metadata of Typical File Systems |
|
|
149 | (5) |
|
11.9 Clues to Deception in a File System |
|
|
154 | (1) |
|
|
155 | (1) |
|
|
155 | (6) |
|
|
158 | (3) |
|
12 Planning Cyberspace Deception |
|
|
161 | (28) |
|
12.1 Cost-Benefit Analysis of Deception |
|
|
161 | (8) |
|
12.1.1 Analysis of a Single Defensive Deception |
|
|
162 | (2) |
|
12.1.2 Analysis of Two-Stage Offensive Deception |
|
|
164 | (2) |
|
12.1.3 Analysis of Two-Stage Defensive Deception |
|
|
166 | (1) |
|
12.1.4 Analysis of a Fake Honeypot |
|
|
167 | (2) |
|
12.2 Analysis of Propagation of Deceptions |
|
|
169 | (1) |
|
12.3 Quantifying Tactics from the Deception Taxonomies |
|
|
170 | (1) |
|
12.4 Counterplanning Against Attacks with Deception |
|
|
171 | (12) |
|
|
172 | (4) |
|
12.4.2 Tracking Attack Plans |
|
|
176 | (1) |
|
12.4.3 Ploys for Counterplans |
|
|
177 | (2) |
|
12.4.4 Greedy Counterplanning |
|
|
179 | (1) |
|
12.4.5 Planning Multiple Deceptions |
|
|
180 | (1) |
|
|
181 | (1) |
|
12.4.7 Entropy Measurement of Deceptions |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
183 | (6) |
|
|
186 | (3) |
|
13 Software Engineering of Deceptive Software and Systems |
|
|
189 | (26) |
|
13.1 Experimental deception |
|
|
190 | (1) |
|
13.2 Deception architectures |
|
|
190 | (2) |
|
13.3 Defensive Deceptive Firewalls |
|
|
192 | (2) |
|
13.4 Low-Interaction Honeypots |
|
|
194 | (8) |
|
|
194 | (1) |
|
13.4.2 Case Study: The Honeyd Honeypot Tool |
|
|
195 | (3) |
|
13.4.3 Case Study: A Deceptive Web Server with Honeyd |
|
|
198 | (1) |
|
13.4.4 Case Study: A Deceptive Web Server with Glastopf |
|
|
199 | (3) |
|
13.5 Implementing Simple Deceptions in Full-Interaction Honeypots |
|
|
202 | (3) |
|
13.6 Server and Spam Honeypots |
|
|
205 | (1) |
|
13.7 Honeypots Attacking Other Machines |
|
|
205 | (1) |
|
13.8 Strategies for Deception Implementation |
|
|
206 | (5) |
|
13.8.1 Hand-Coded Deceptions |
|
|
206 | (1) |
|
13.8.2 Software Instrumentation with Wrappers |
|
|
206 | (2) |
|
13.8.3 Deception Control Policies |
|
|
208 | (1) |
|
13.8.4 Virtualization and Redirection |
|
|
209 | (1) |
|
13.8.5 Deceptions in Hardware |
|
|
210 | (1) |
|
|
211 | (1) |
|
|
211 | (4) |
|
|
212 | (3) |
|
|
215 | (16) |
|
|
216 | (1) |
|
14.2 Design Issues for Fake I/O Devices |
|
|
216 | (7) |
|
|
217 | (3) |
|
14.2.2 Tactics for Decoy Devices |
|
|
220 | (1) |
|
14.2.3 Hardware Support for Decoy Devices |
|
|
221 | (1) |
|
14.2.4 Tracking Down Malicious Activity |
|
|
222 | (1) |
|
14.3 Case Study: Decoy Network Interface Controller |
|
|
223 | (5) |
|
14.3.1 Anti-Malware Testing |
|
|
223 | (1) |
|
14.3.2 Results of Testing |
|
|
224 | (2) |
|
14.3.3 More About Coexistence with Real NICs |
|
|
226 | (2) |
|
|
228 | (1) |
|
|
228 | (3) |
|
|
229 | (2) |
|
15 Deception for the Electrical Power Industry |
|
|
231 | (10) |
|
15.1 Simulating Electrical Power Plants |
|
|
232 | (1) |
|
15.2 Building a Power-Plant Simulator |
|
|
232 | (1) |
|
|
233 | (2) |
|
15.4 Defense of Electrical Substations |
|
|
235 | (1) |
|
15.4.1 Defensive Deception for Electrical Substations |
|
|
235 | (1) |
|
15.5 Deception Engineering for a Real Example of Malware |
|
|
236 | (2) |
|
15.5.1 Operation of Havex |
|
|
236 | (1) |
|
15.5.2 Experiments with Havex |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (3) |
|
|
239 | (2) |
|
16 Law and Ethics for Software Deception |
|
|
241 | (10) |
|
16.1 Applying Ethics to Cyberspace |
|
|
241 | (4) |
|
16.1.1 Ethical-Climate Issues |
|
|
243 | (1) |
|
16.1.2 Escalation of Distrust |
|
|
243 | (1) |
|
16.1.3 Ensuring Minimal Harms |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (1) |
|
16.1.7 Strategic Deception |
|
|
245 | (1) |
|
16.2 Legal Issues in Deception |
|
|
245 | (3) |
|
|
246 | (1) |
|
|
246 | (1) |
|
|
247 | (1) |
|
16.2.4 International Law on Cyberattacks |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (3) |
|
|
249 | (2) |
Chapter Photographs |
|
251 | (2) |
Appendix A Fake Directory Generator |
|
253 | (14) |
Appendix B Stochastic String Generator |
|
267 | (6) |
Appendix C Resource-Deception Consistency Checker |
|
273 | (10) |
Appendix D Rootkit Attack Planner |
|
283 | (36) |
Appendix E Counterplanner for Attacks |
|
319 | |