Skip to main content

Software Engineering of Deceptive Software and Systems

  • Chapter
  • First Online:
Introduction to Cyberdeception
  • 1461 Accesses

Abstract

This chapter considers further details in how to implement the deceptions described in this book. For readers interested in still more details, Heckman et al. (2015) provides a detailed top-down view of deception planning, and Bodmer et al. (2012) offers useful alternative approaches to operationalizing deception. Heckman et al. (2015) situates cyberdeception in the context of military operations planning, and Bodmer et al. (2012) is a good resource for people on the front lines of cyberattacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Bakos G, Bratus S (2005) Ubiquitous redirection as access control response. In: Proceedings of the 3rd annual conference on privacy, security and trust, New Brunswick, Canada, 12–14 Oct, 2005

    Google Scholar 

  • Bodmer S, Kilger A, Carpenter G, Jones J (2012) Reverse deception: organized cyber threat counter-exploitation. McGraw-Hill Education, New York

    Google Scholar 

  • Chang H-Y, Wu S, Jou Y (2001) Real-time protocol analysis for detecting link-state routing protocol attacks. ACM Trans Inf Syst Secur 4(1):1–36

    Article  Google Scholar 

  • Chapple M, Ballad B, Ballad T, Banks E (2013) Access control, authentication, and public key infrastructure, 2nd edn. Jones and Bartlett, New York

    Google Scholar 

  • Cohen F (1999) A mathematical structure of simple defensive network deceptions. all.net/journal/deception/mathdeception/mathdeception.html. Accessed 15 Jan 2016

    Google Scholar 

  • Cohen F, Koike D (2003) Leading attackers through attack graphs with deceptions. Comput Security 22(5):402–411

    Article  Google Scholar 

  • Cohen F, Marin I, Sappington J, Stewart C, Thomas E (2001) Red teaming experiments with deceptions technologies. all.net/journal/deception/ RedTeamingExperiments.pdf. Accessed 15 Jan, 2016

    Google Scholar 

  • Crane S, Larsen P, Brunthaler S, Franz M (2013) Booby trapping software. In: Proceedings of the new security paradigms workshop, Banff, AB, Canada, 9–12 Sept, 2013. pp 95–105

    Google Scholar 

  • Ford R, Howard M (2007) How not to be seen. IEEE Secur Priv 5(1):67–69

    Article  Google Scholar 

  • Frederick E, Rowe N, Wong A (2012) Testing deception tactics in response to cyberattacks. National symposium on moving target research, Annapolis, MD, 11 June, 2102

    Google Scholar 

  • Fu X, Yu W, Cheng D, Tan X, Streff K, Graham S (2006) On recognizing virtual honeypots and countermeasures. In: Proceedings of the 2nd IEEE international symposium on dependable, autonomic, and secure computing, Indianapolis, IN. pp 211–218

    Google Scholar 

  • Heckman K, Walsh M, Stech F, O’Boyle T, DiCato S, Herber A (2013) Active cyber defense with denial and deception: a cyber-wargame experiment. Comput Security 37:72–77

    Article  Google Scholar 

  • Heckman K, Stech F, Thomas R, Schmoker B, Tsow A (2015) Cyber denial, deception, and counter deception: a framework for supporting active cyber defense. Springer, New York

    Book  Google Scholar 

  • Hernacki B, Bennett J, Lofgran T (2004) Symantec deception server: experience with a commercial deception system. In: Proceedings of the seventh international symposium in resent advances in intrusion detection, Sophia Antipolis, France, 15–17 Sept, 2004. pp 188–202

    Google Scholar 

  • Kempf T, Karuri K, Gao L (2009) Software instrumentation. In: Wah B (ed) Wiley encyclopedia of computer science and engineering 1 (11). Wiley-Interscience, New York

    Google Scholar 

  • Michael J, Auguston M, Rowe N, Riehle R (2002) Software decoys: intrusion detection and countermeasures. In: Proceedings of the IEEE-SMC workshop on information assurance, West Point, New York, 17–19 June, 2002. pp 130–138

    Google Scholar 

  • Noonan W, Dubrawsky I (2006) Firewall fundamentals. Cisco, Indianapolis, IN

    Google Scholar 

  • Pang R, Veqneswaran V, Barford P, Paxon V, Peterson L (2004) Characteristics of Internet background radiation. In: Proceedings of the 4th ACM SIGCOMM conference on internet measurement, Taormina, IT, 25–27 Oct, 2004. pp 27–40

    Google Scholar 

  • Provos N, Holz T (2008) Virtual honeypots: from botnet tracking to intrusion detection. Addison-Wesley, Upper Saddle River, NJ

    Google Scholar 

  • Rinard M, Cadar C, Dumitran D, Roy D, Leu T (2004) A dynamic technique for eliminating buffer overflow vulnerabilities (and other memory errors). In: Proceedings of the 20th annual computer security applications conference, Tucson, AZ, 6–10 Dec, 2004. pp 82–90

    Google Scholar 

  • Rowe N, Goh H (2007) Thwarting cyber-attack reconnaissance with inconsistency and deception. In: Proceedings of the 8th IEEE information assurance workshop, West Point, NY, 20–22 June, 2007. pp 151–158

    Google Scholar 

  • ShadowServer (2007) What is a honeypot? www.shadowserver.org/wiki/ pmkiki.php?n = Information.Honeypots. Accessed 22 July, 2008

  • Shiue LM, Kao SJ (2008) Countermeasure for detection of honeypot deployment. In: Proceedings of the international conference on computer and communication engineering, Kuala Lumpur, Malaysia, 13–15 May, 2008. pp 595–599

    Google Scholar 

  • Smith D (2007) Why we lie: the evolutionary roots of deception and the unconscious mind. St. Martin’s Griffin, New York

    Google Scholar 

  • Wuu L-C, Chen, S-F (2003) Building intrusion pattern miner for Snort network intrusion detection system. In: Proceedings of the 37th IEEE Carnahan conference on security technology, 14–16 Oct 2003. pp 477–484

    Google Scholar 

  • Yahyaoui A, Rowe N (2015) Testing simple deceptive honeypot tools. In: Proceedings of SPIE defense and security, Baltimore MD, 20–24 April, 2015. Paper 9458-2

    Google Scholar 

  • Yost G (1985) Spy-tech. Facts on File, New York

    Google Scholar 

  • Zarras A (2014) The art of false alarms in the game of deception: Leveraging fake honeypots for enhanced security. In: Proceedings of the Carnahan conference on security technology, Rome, Italy, 13–16 Oct 2014. pp 1–6

    Google Scholar 

  • Zou C, Cunningham R (2006) Honeypot-aware advanced botnet construction and maintenance. In: Proceedings of the international conference on dependable systems and networks, Philadelphia, PA, 25–28 June, 2006. pp 199–208

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rowe, N.C., Rrushi, J. (2016). Software Engineering of Deceptive Software and Systems. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41187-3_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41185-9

  • Online ISBN: 978-3-319-41187-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics