Two Taxonomies of Deception for Attacks on Information Systems

ABSTRACT

‘Cyberwar’ is information warfare directed at the software of information systems. It represents an increasing threat to our militaries and civilian infrastructures. Six principles of military deception are enumerated and applied to cyberwar. Two taxonomies of deception methods for cyberwar are then provided, making both offensive and defensive analogies from deception strategies and tactics in conventional war to this new arena. One taxonomy has been published in the military literature, and the other is based on case theory in linguistics. The application of both taxonomies to cyberwar is new. We then show how to quantify and rank proposed deceptions for planning using ‘suitability’ numbers associated with the taxonomies. The paper provides planners for cyberwar with a more comprehensive enumeration than any yet published to the tactics and strategies that they and their enemies may use. Some analogies to deception in conventional warfare hold, but many do not, and careful thought and preparation must be applied to any deception effort.


AUTHORS

Photo of Neil C. Rowe

U.S. Naval Postgraduate School
Monterey, California, U.S.A.
 

Dr. Neil C. Rowe is a professor of computer science at the U.S. Naval Postgraduate School (Monterey, CA, USA) where   he   has   been   since 1983. He earned a doctorate in computer science from Stanford University (1983). His main research interests   are    data    mining, digital forensics, modelling of deception, and cyber warfare.

 

Senior Lecturer, Department of Defense Analysis, U.S. Naval Postgraduate School, Monterey, California

Hy Rothstein is a Senior Lecturer in the Department of Defense Analysis at the U.S. Naval Postgraduate School, served in the U.S. Army as a Special Forces officer for more than 26 years. He served as the Director of Plans and Exercises, Joint Special Operations Command (JSOC), for more than three years and helped develop and operate the first special operations battle lab prior to his retirement in 1999. He has earned degrees from the U.S. Military Academy, the U.S. Army Command and General Staff College, and the Fletcher School at Tufts University.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com