Skip to main content

Looking to the Future

  • Chapter
  • First Online:
Cyber Denial, Deception and Counter Deception

Part of the book series: Advances in Information Security ((ADIS))

  • 2068 Accesses

Abstract

This book has built on the existing body of research in classical D&D and provided a theoretical framework to adapt classical D&D for cyber security, but the field of cyber-D&D has barely begun to develop. This chapter outlines promising areas for advanced research and development.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Google searches show hundreds of thousands of hits for 〈training OR courses AND “cybersecurity”〉 but only a few dozen hits for 〈training OR courses AND “cyber-deception”〉, and none were actually for courses.

  2. 2.

    Whitham, B. (2011) “Defining Responsibilities for Tactical Military Cyber Deception Operations,” Journal of Battlefield Technology, v. 14, no. 3, November 2011, p. 19–24.

  3. 3.

    Such as those used in the U.S. military academies and other universities.

  4. 4.

    Other than a few references to detecting deception in social engineering situations, we found no research on cyber-counterdeception, per se.

  5. 5.

    Whaley, B. (2007f) “The one percent solution: Costs and benefits of military deception,” in Arquilla, J. & D. A. Borer, eds. (2007) Information Strategy and Warfare: A guide to theory and practice. New York: Routledge.

  6. 6.

    Bloom, R. (2013) Foundations of Psychological Profiling: Terrorism, Espionage, and Deception. Boca Raton FL: Taylor & Francis Group.

  7. 7.

    See, for example, Caverni, Fabre & Michel Gonzalez, eds. (1990) Cognitive Biases. New York: Elsevier, and Yetiv, S. (2013) National Security Through a Cockeyed Lens: How Cognitive Bias Impacts U.S. Foreign Policy. Baltimore: Johns Hopkins University Press.

  8. 8.

    One 2009 report suggested the Chinese will employ integrated network electronic warfare which includes “using techniques such as electronic jamming, electronic deception and suppression to disrupt information acquisition and information transfer, launching a virus attack or hacking to sabotage information processing and information utilization, and using anti-radiation and other weapons based on new mechanisms to destroy enemy information platforms and information facilities.” Krekel, Bryan (2009) Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. McLean VA: Northrop Grumman Corporation.

References

  • Bennett, M., & Waltz, E. (2007). Counterdeception principles and applications for national security. Norwood, MA: Artech House.

    Google Scholar 

  • Bloom, R. (2013) Foundations of Psychological Profiling: Terrorism, Espionage, and Deception. Boca Raton, FL: Taylor & Francis Group.

    Google Scholar 

  • Bodmer, S., M. Kilger, G. Carpenter, and J. Jones (2012) Reverse Deception: Organized Cyber Threat Counter-Exploitation. McGraw-Hill: New York.

    Google Scholar 

  • Carroll, T. E., & Grosu, D. (2011). A game theoretic investigation of deception in network security. Security and Communication Networks, 4(10), 1162-1172.

    Article  Google Scholar 

  • Caverni, F. & M. Gonzalez, eds. (1990) Cognitive Biases. New York: Elsevier.

    Google Scholar 

  • Chen, Z. (2007) Modeling and Defending Against Internet Worm Attacks. PhD thesis, Georgia Institute of Technology, May 2007. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.6082&rep=rep1&type=pdf.

    Google Scholar 

  • Garg, N. & Grosu, D. (2007) “Deception in Honeynets: A Game-Theoretic Analysis,” Proceedings of the 2007 IEEE, Workshop on Information Assurance, United States Military Academy, West Point NY, 20-22 June 2007.

    Google Scholar 

  • Gueye, A. (2011) A Game Theoretical Approach to Communication Security. Dissertation, Electrical Engineering and Computer Sciences, University of California, Berkeley, Spring 2011.

    Google Scholar 

  • Hagestad, W. (2012) 21st Century Chinese Cyberwarfare. London: IT Governance Ltd..

    Google Scholar 

  • Harmer, P.K., Williams P.D., Gunsch, G.H., Lamont, G.B. (2002). “An Artificial Immune System Architecture for Computer Security Applications.” IEEE Transactions on Evolutionary Computation, v. 6, no. 3, June 2002.

    Google Scholar 

  • He, F. Zhuang, J. S. Nageswara, & Rao, V. (2012). “Game-Theoretic Analysis of Attack and Defense in Cyber-Physical Network Infrastructures,” Proceedings of the 2012 Industrial and Systems Engineering Research Conference, Orlando FL, 19 May 2012.

    Google Scholar 

  • Henderson, S. J. (2007). The dark visitor : inside the world of Chinese hackers. Morrisville, NC: Lulu Press.

    Google Scholar 

  • Hespanha, J. & Doyle, F. III. (2010) “Bio-inspired Network Science,” in Robert E. Armstrong, Mark D. Drapeau, Cheryl A. Loeb, and James J. Valdes (eds.). Bio-inspired Innovation and National Security. Center for Technology and National Security Policy, National Defense University Press: Washington DC.

    Google Scholar 

  • Hsu, L-T. (2010) A Game Theoretical Approach for Decision and Analysis of adopting Proactive Defense Strategy. Thesis for Master of Science, Department of Computer Science and Engineering, Tatung University, July 2010.

    Google Scholar 

  • Irvine, C.E., Thompson, M.F., Allen, T.K. (2005). “CyberCIEGE: gaming for information assurance,” Security & Privacy, IEEE, vol.3, no.3, pp. 61- 64, May-June 2005

    Google Scholar 

  • Krekel, B. (2009) Capability of the People’s Republic of China to Conduct Cyber Warfare and Computer Network Exploitation. McLean VA: Northrop Grumman Corporation.

    Google Scholar 

  • Krekel, B., P. Adams, and G. Bakos (2012) Occupying the Information HighGround: Chinese Capabilities for Computer Network Operations and Cyber Espionage. Prepared for the U.S.-China Economic and Security Review Commission by Northrop Grumman Corp., March 7, 2012. http://www2.gwu.edu/~nsarchiv/NSAEBB/NSAEBB424/docs/Cyber-066.pdf

  • Hagestad, W. (2012) 21st Century Chinese Cyberwarfare. London: IT Governance Ltd.

    Google Scholar 

  • Lai, R. and S. Rahman (2012) “Analytic of China Cyberattack,” International Journal of Multimedia & Its Applications, V.4, N.3, June 2012, p. 41. http://airccse.org/journal/jma/4312ijma04.pdf

    Google Scholar 

  • Mandiant (2013) APT1: Exposing One of China’s Cyber Espionage Units. http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf

    Google Scholar 

  • Mengin,F. (2004) ed. Cyber China: Reshaping National Identities in the Age of Information. Palgrave Macmillan: New York.

    Google Scholar 

  • Muñiz, J. Jr. (2009) Declawing the Dragon: Why the U.S. Must Counter Chinese Cyber-Warriors. Thesis Master of Military Art and Science, U.S. Army Command and General Staff College: Fort Leavenworth KS.

    Google Scholar 

  • Press, W.H. & Dyson, F.J. (2012). “Iterated Prisoner’s Dilemma contains strategies that dominate any evolutionary opponent,” Proceedings of the National Academy of Science, v. 109 no. 26, pp. 10409-10413.

    Google Scholar 

  • Sawyer, R.D. (2007). The Tao of Deception: A History of Unorthodox Warfare in China. Basic Books: New York.

    Google Scholar 

  • Somayaji, A., Hofmeyr, S., & and Forrest.S. (1997) “Principles of a Computer Immune System.” 1997 ACM New Security Paradigms Workshop, Langdale, Cumbria, UK.

    Google Scholar 

  • Stein, T., Chen, E., & Mangla, K. (2011). Facebook immune system. Paper presented at the 4th Workshop on Social Network Systems, SNS’11, April 10, 2011—April 13, 2011, Salzburg, Austria.

    Google Scholar 

  • Stokes, M. A. and L.C. R. Hsiao (2012) Countering Chinese Cyber Operations: Opportunities and Challenges for U.S. Interests. Project 2049 Institute, October 29, 2012. http://project2049.net/documents/countering_chinese_cyber_operations_stokes_hsiao.pdf

    Google Scholar 

  • Thomas, T.L. (2004) Dragon Bytes: Chinese Information-War Theory and Practice. Foreign Military Studies Office: Fort Leavenworth KS, 2004.

    Google Scholar 

  • Thomas, T.L. (2007) Decoding the Virtual Dragon—Critical Evolutions in the Science and Philosophy of China’s Information Operations and Military Strategy. Foreign Military Studies Office: Fort Leavenworth KS, 2007.

    Google Scholar 

  • Thomas, T.L (2009). The Dragon’s Quantum Leap: Transforming from a Mechanized to an Informatized Force. Foreign Military Studies Office: Fort Leavenworth KS, 2009.

    Google Scholar 

  • Whaley, B. (2007a). Stratagem: Deception and Surprise in War. Artech House: Norwood, MA.

    Google Scholar 

  • Whaley, B. (2007b) “The one percent solution: Costs and benefits of military deception,” in Arquilla, J. & D. A. Borer, eds. (2007) Information Strategy and Warfare: A guide to theory and practice. New York: Routledge.

    Google Scholar 

  • Whitham, B. (2011) “Defining Responsibilites for Tactical Miltary Cyber Deception Operations,” Journal of Battlefield Technology, v. 14, no. 3, November 2011, pp. 19-24.

    Google Scholar 

  • Yetiv, S. (2013) National Security Through a Cockeyed Lens: How Cognitive Bias Impacts U.S. Foreign Policy. Baltimore: Johns Hopkins University Press.

    Google Scholar 

  • Zhuang, J., Bier, V. M., & Alagoz, O. (2010). Modeling secrecy and deception in a multiple-period attacker-defender signaling game. European Journal of Operational Research, 203(2), 409-418.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Heckman, K.E., Stech, F.J., Thomas, R.K., Schmoker, B., Tsow, A.W. (2015). Looking to the Future. In: Cyber Denial, Deception and Counter Deception. Advances in Information Security. Springer, Cham. https://doi.org/10.1007/978-3-319-25133-2_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25133-2_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25131-8

  • Online ISBN: 978-3-319-25133-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics