Abstract
Delaying tactics are often useful when you don’t trust someone, or perhaps don’t trust them yet. So they are useful for cybersystems when they are suspicious of the circumstances. Bureaucracies often do it, either deliberately or inadvertently (Wilson 2000). Often deception is involved in delaying because, for the delay to be most effective, the delayer should not tell the delayee why, but either avoid or evade the question if asked. Delaying works well with cybersystems because unexplained delays occur naturally from time to time when, for instance, network connections go down and a cybersystem is waiting for them, or when a cybersystem decides to do occasional housekeeping tasks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alt L, Beverly R, Dainotti A (2014) Uncovering network tarpits with Degreaser. In: Proceedings of annual computer security applications conference, 9–12 Dec, 2014, New Orleans, LA. pp 156–165
Caltagirone S, Frincke D (2005) The response continuum. In: Proceedings of the IEEE workshop on information assurance and security, United States Military Academy, 15–17 Jun, 2005, West Point, NY
Hall M, Brown L (2003) Core servlets and JavaServer pages, vol 1, 2nd edn, Core technologies. Prentice-Hall, Upper Saddle River, NJ
Julian D, Rowe N, Michael J (2003) Experiments with deceptive software responses to buffer-based attacks. In: Proceedings of the IEEE-SMC workshop on information assurance, West Point, New York, 18–20 Jun, 2003. pp 43–44
Lydon J, Zanna M (1990) Commitment in the face of adversity: a value-affirmation approach. J Pers Soc Psychol 58(6):1040–1047
Qassrawi M, Hongli Z (2010) Deception methodology in virtual honeypots. In: Proceedings of the second international conference on networks security, wireless communications, and trusted computing, Wuhan, China, 24–25 Apr 2010. pp 462–467
Schneider A (2011) The theory and practice of magic deception. CreateSpace, North Charleston, SC
Somayaji A, Forrest S (2000) Automated response using system-call delays. In: Proceedings of the 9th Usenix security symposium, Denver, CO, 14–17 Aug, 2000. pp 185–198
Wilson J (2000) Bureaucracy, new edn. Basic Books, New York
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rowe, N.C., Rrushi, J. (2016). Delays. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-41187-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41185-9
Online ISBN: 978-3-319-41187-3
eBook Packages: Computer ScienceComputer Science (R0)