Abstract
This book has built on the existing body of research in classical D&D and provided a theoretical framework to adapt classical D&D for cyber security, but the field of cyber-D&D has barely begun to develop. This chapter outlines promising areas for advanced research and development.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Google searches show hundreds of thousands of hits for 〈training OR courses AND “cybersecurity”〉 but only a few dozen hits for 〈training OR courses AND “cyber-deception”〉, and none were actually for courses.
- 2.
Whitham, B. (2011) “Defining Responsibilities for Tactical Military Cyber Deception Operations,” Journal of Battlefield Technology, v. 14, no. 3, November 2011, p. 19–24.
- 3.
Such as those used in the U.S. military academies and other universities.
- 4.
Other than a few references to detecting deception in social engineering situations, we found no research on cyber-counterdeception, per se.
- 5.
Whaley, B. (2007f) “The one percent solution: Costs and benefits of military deception,” in Arquilla, J. & D. A. Borer, eds. (2007) Information Strategy and Warfare: A guide to theory and practice. New York: Routledge.
- 6.
Bloom, R. (2013) Foundations of Psychological Profiling: Terrorism, Espionage, and Deception. Boca Raton FL: Taylor & Francis Group.
- 7.
See, for example, Caverni, Fabre & Michel Gonzalez, eds. (1990) Cognitive Biases. New York: Elsevier, and Yetiv, S. (2013) National Security Through a Cockeyed Lens: How Cognitive Bias Impacts U.S. Foreign Policy. Baltimore: Johns Hopkins University Press.
- 8.
One 2009 report suggested the Chinese will employ integrated network electronic warfare which includes “using techniques such as electronic jamming, electronic deception and suppression to disrupt information acquisition and information transfer, launching a virus attack or hacking to sabotage information processing and information utilization, and using anti-radiation and other weapons based on new mechanisms to destroy enemy information platforms and information facilities.” Krekel, Bryan (2009) Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. McLean VA: Northrop Grumman Corporation.
References
Bennett, M., & Waltz, E. (2007). Counterdeception principles and applications for national security. Norwood, MA: Artech House.
Bloom, R. (2013) Foundations of Psychological Profiling: Terrorism, Espionage, and Deception. Boca Raton, FL: Taylor & Francis Group.
Bodmer, S., M. Kilger, G. Carpenter, and J. Jones (2012) Reverse Deception: Organized Cyber Threat Counter-Exploitation. McGraw-Hill: New York.
Carroll, T. E., & Grosu, D. (2011). A game theoretic investigation of deception in network security. Security and Communication Networks, 4(10), 1162-1172.
Caverni, F. & M. Gonzalez, eds. (1990) Cognitive Biases. New York: Elsevier.
Chen, Z. (2007) Modeling and Defending Against Internet Worm Attacks. PhD thesis, Georgia Institute of Technology, May 2007. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.6082&rep=rep1&type=pdf.
Garg, N. & Grosu, D. (2007) “Deception in Honeynets: A Game-Theoretic Analysis,” Proceedings of the 2007 IEEE, Workshop on Information Assurance, United States Military Academy, West Point NY, 20-22 June 2007.
Gueye, A. (2011) A Game Theoretical Approach to Communication Security. Dissertation, Electrical Engineering and Computer Sciences, University of California, Berkeley, Spring 2011.
Hagestad, W. (2012) 21st Century Chinese Cyberwarfare. London: IT Governance Ltd..
Harmer, P.K., Williams P.D., Gunsch, G.H., Lamont, G.B. (2002). “An Artificial Immune System Architecture for Computer Security Applications.” IEEE Transactions on Evolutionary Computation, v. 6, no. 3, June 2002.
He, F. Zhuang, J. S. Nageswara, & Rao, V. (2012). “Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures,” Proceedings of the 2012 Industrial and Systems Engineering Research Conference, Orlando FL, 19 May 2012.
Henderson, S. J. (2007). The dark visitor : inside the world of Chinese hackers. Morrisville, NC: Lulu Press.
Hespanha, J. & Doyle, F. III. (2010) “Bio-inspired Network Science,” in Robert E. Armstrong, Mark D. Drapeau, Cheryl A. Loeb, and James J. Valdes (eds.). Bio-inspired Innovation and National Security. Center for Technology and National Security Policy, National Defense University Press: Washington DC.
Hsu, L-T. (2010) A Game Theoretical Approach for Decision and Analysis of adopting Proactive Defense Strategy. Thesis for Master of Science, Department of Computer Science and Engineering, Tatung University, July 2010.
Irvine, C.E., Thompson, M.F., Allen, T.K. (2005). “CyberCIEGE: gaming for information assurance,” Security & Privacy, IEEE, vol.3, no.3, pp. 61- 64, May-June 2005
Krekel, B. (2009) Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. McLean VA: Northrop Grumman Corporation.
Krekel, B., P. Adams, and G. Bakos (2012) Occupying the Information HighGround: Chinese Capabilities for Computer Network Operations and Cyber Espionage. Prepared for the U.S.-China Economic and Security Review Commission by Northrop Grumman Corp., March 7, 2012. http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-066.pdf
Hagestad, W. (2012) 21st Century Chinese Cyberwarfare. London: IT Governance Ltd.
Lai, R. and S. Rahman (2012) “Analytic of China Cyberattack,” International Journal of Multimedia & Its Applications, V.4, N.3, June 2012, p. 41. http://airccse.org/journal/jma/4312ijma04.pdf
Mandiant (2013) APT1: Exposing One of China’s Cyber Espionage Units. http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf
Mengin,F. (2004) ed. Cyber China: Reshaping National Identities in the Age of Information. Palgrave Macmillan: New York.
Muñiz, J. Jr. (2009) Declawing the Dragon: Why the U.S. Must Counter Chinese Cyber-Warriors. Thesis Master of Military Art and Science, U.S. Army Command and General Staff College: Fort Leavenworth KS.
Press, W.H. & Dyson, F.J. (2012). “Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent,” Proceedings of the National Academy of Science, v. 109 no. 26, pp. 10409-10413.
Sawyer, R.D. (2007). The Tao of Deception: A History of Unorthodox Warfare in China. Basic Books: New York.
Somayaji, A., Hofmeyr, S., & and Forrest.S. (1997) “Principles of a Computer Immune System.” 1997 ACM New Security Paradigms Workshop, Langdale, Cumbria, UK.
Stein, T., Chen, E., & Mangla, K. (2011). Facebook immune system. Paper presented at the 4th Workshop on Social Network Systems, SNS’11, April 10, 2011—April 13, 2011, Salzburg, Austria.
Stokes, M. A. and L.C. R. Hsiao (2012) Countering Chinese Cyber Operations: Opportunities and Challenges for U.S. Interests. Project 2049 Institute, October 29, 2012. http://project2049.net/documents/countering_chinese_cyber_operations_stokes_hsiao.pdf
Thomas, T.L. (2004) Dragon Bytes: Chinese Information-War Theory and Practice. Foreign Military Studies Office: Fort Leavenworth KS, 2004.
Thomas, T.L. (2007) Decoding the Virtual Dragon—Critical Evolutions in the Science and Philosophy of China’s Information Operations and Military Strategy. Foreign Military Studies Office: Fort Leavenworth KS, 2007.
Thomas, T.L (2009). The Dragon’s Quantum Leap: Transforming from a Mechanized to an Informatized Force. Foreign Military Studies Office: Fort Leavenworth KS, 2009.
Whaley, B. (2007a). Stratagem: Deception and Surprise in War. Artech House: Norwood, MA.
Whaley, B. (2007b) “The one percent solution: Costs and benefits of military deception,” in Arquilla, J. & D. A. Borer, eds. (2007) Information Strategy and Warfare: A guide to theory and practice. New York: Routledge.
Whitham, B. (2011) “Defining Responsibilites for Tactical Miltary Cyber Deception Operations,” Journal of Battlefield Technology, v. 14, no. 3, November 2011, pp. 19-24.
Yetiv, S. (2013) National Security Through a Cockeyed Lens: How Cognitive Bias Impacts U.S. Foreign Policy. Baltimore: Johns Hopkins University Press.
Zhuang, J., Bier, V. M., & Alagoz, O. (2010). Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 203(2), 409-418.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Heckman, K.E., Stech, F.J., Thomas, R.K., Schmoker, B., Tsow, A.W. (2015). Looking to the Future. In: Cyber Denial, Deception and Counter Deception. Advances in Information Security. Springer, Cham. https://doi.org/10.1007/978-3-319-25133-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-25133-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25131-8
Online ISBN: 978-3-319-25133-2
eBook Packages: Computer ScienceComputer Science (R0)