Skip to main content

Defensive Camouflage

  • Chapter
  • First Online:
  • 1455 Accesses

Abstract

Camouflage, or concealment of something real, is a common technique of offensive cyberdeception (Ford and Howard 2007). It can be used for defense to hide valuable data and programs. Also, since it can also be used to conceal the perpetrators of an attack (Nunes et al. 2015), it can similarly conceal defenders. The techniques of Chap. 7 can aid camouflage, but there are others.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • Anderson F, Grossman T, Wigdor D, Fitzmaurice G (2015) Supporting subtlety with deceptive devices and illusory interactions. In: Proceedings of CHI 2015, Seoul, South Korea, 18–23 Apr 2015

    Google Scholar 

  • Bashar M, Krishnan G, Kuhn, M, Spafford, E, Wagstaff, S (1997) Low-threat security patches and tools. In: Proceedings of the international conference on software maintenance, Bari, IT, 1-3 Oct, 1997. pp 306–313

    Google Scholar 

  • Dang B, Gazet A, Bachaalany E, Josse S (2014) Practical reverse engineering: x86, x64, ARM, Windows kernel, reversing tools, and obfuscation. Wiley, New York

    Google Scholar 

  • Ford R, Howard M (2007) How not to be seen. IEEE Security and Privacy 5(1):67–69

    Google Scholar 

  • Fridich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, Cambridge, UK

    Book  Google Scholar 

  • Heiderich M, Nava E, Heyes G, Lindsay D (2010) Web application obfuscation: ‘-/WAFs…Evasion..Filters//alert/Obfuscation/-‘. Syngress, Rockland, MA

    Google Scholar 

  • Holz T, Raynal F (2005) Detecting honeypots and other suspicious environments. In: Proceedings of the 6th IEEE-SMC information assurance workshop, West Point, NY, 15–17 June, 2005. pp 29–36

    Google Scholar 

  • Huebner E, Bem D, Wee C (2006) Data hiding in the NTFS file system. Digital Invest 3(4):211–226

    Article  Google Scholar 

  • Jahankhani H, Beqiri E (2010) Digital evidence manipulation using anti-forensic tools and techniques. In: Handbook of electronic security and digital forensics. World Scientific, Singapore, pp 411–425

    Chapter  Google Scholar 

  • Nunes E, Kulkarni N, Shakarian P, Ruef A, Little J (2015) Cyber-deception and attribution in capture-the-flag exercises. In: Proceedings of the IEEE/ACM international conference on advanced in social networks analysis and mining, Paris, France, 25–28 Aug, 2015. pp 962–965

    Google Scholar 

  • The Honeynet Project (2004) Know your enemy, 2nd edn. Addison-Wesley, Boston, MA

    Google Scholar 

  • Tian J, Li N, Wang Z (2007) A proactive defense scheme based on the cooperation of intrusion deception and traceback. In: Proceedings of the computational intelligence and security workshops, Harbin, China, 15–19 Dec, 2007. pp 502–505

    Google Scholar 

  • Yegneswaran V, Alfeld C, Barford P, Cai J-Y (2007) Camouflaging honeynets. In: Proceedings of the IEEE global Internet symposium, May 2007. pp 49–54

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rowe, N.C., Rrushi, J. (2016). Defensive Camouflage. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41187-3_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41185-9

  • Online ISBN: 978-3-319-41187-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics