Abstract
Camouflage, or concealment of something real, is a common technique of offensive cyberdeception (Ford and Howard 2007). It can be used for defense to hide valuable data and programs. Also, since it can also be used to conceal the perpetrators of an attack (Nunes et al. 2015), it can similarly conceal defenders. The techniques of Chap. 7 can aid camouflage, but there are others.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Anderson F, Grossman T, Wigdor D, Fitzmaurice G (2015) Supporting subtlety with deceptive devices and illusory interactions. In: Proceedings of CHI 2015, Seoul, South Korea, 18–23 Apr 2015
Bashar M, Krishnan G, Kuhn, M, Spafford, E, Wagstaff, S (1997) Low-threat security patches and tools. In: Proceedings of the international conference on software maintenance, Bari, IT, 1-3 Oct, 1997. pp 306–313
Dang B, Gazet A, Bachaalany E, Josse S (2014) Practical reverse engineering: x86, x64, ARM, Windows kernel, reversing tools, and obfuscation. Wiley, New York
Ford R, Howard M (2007) How not to be seen. IEEE Security and Privacy 5(1):67–69
Fridich J (2009) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, Cambridge, UK
Heiderich M, Nava E, Heyes G, Lindsay D (2010) Web application obfuscation: ‘-/WAFs…Evasion..Filters//alert/Obfuscation/-‘. Syngress, Rockland, MA
Holz T, Raynal F (2005) Detecting honeypots and other suspicious environments. In: Proceedings of the 6th IEEE-SMC information assurance workshop, West Point, NY, 15–17 June, 2005. pp 29–36
Huebner E, Bem D, Wee C (2006) Data hiding in the NTFS file system. Digital Invest 3(4):211–226
Jahankhani H, Beqiri E (2010) Digital evidence manipulation using anti-forensic tools and techniques. In: Handbook of electronic security and digital forensics. World Scientific, Singapore, pp 411–425
Nunes E, Kulkarni N, Shakarian P, Ruef A, Little J (2015) Cyber-deception and attribution in capture-the-flag exercises. In: Proceedings of the IEEE/ACM international conference on advanced in social networks analysis and mining, Paris, France, 25–28 Aug, 2015. pp 962–965
The Honeynet Project (2004) Know your enemy, 2nd edn. Addison-Wesley, Boston, MA
Tian J, Li N, Wang Z (2007) A proactive defense scheme based on the cooperation of intrusion deception and traceback. In: Proceedings of the computational intelligence and security workshops, Harbin, China, 15–19 Dec, 2007. pp 502–505
Yegneswaran V, Alfeld C, Barford P, Cai J-Y (2007) Camouflaging honeynets. In: Proceedings of the IEEE global Internet symposium, May 2007. pp 49–54
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rowe, N.C., Rrushi, J. (2016). Defensive Camouflage. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-41187-3_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41185-9
Online ISBN: 978-3-319-41187-3
eBook Packages: Computer ScienceComputer Science (R0)