Using Deception to Hide Things from Hackers: Processes, Principles, and Techniques

ABSTRACT

Deception offers one means of hiding things from an adversary.  This paper introduces a model for understanding, comparing, and developing methods of deceptive hiding.  The model characterizes deceptive hiding in terms of how it defeats the underlying processes that an adversary uses to discover the hidden thing.  An adversary’s process of discovery can take three forms: direct observation (sensing and recognizing), investigation (evidence collection and hypothesis formation), and learning from other people or agents.  Deceptive hiding works by defeating one or more elements of these processes.  The model is applied to computer security, and it is also applicable to other domains.


AUTHORS

Computer Science Department at North Carolina State University

Jim Yuill is a PhD candidate in the Computer Science Department at North Carolina State University. His thesis is on deception for computer security. Jim previously worked at IBM in operating systems development.

Professor, Defense Analysis Naval Postgraduate School, Monterey, California

Dorothy Denning is Professor of Defense Analysis at the Naval Postgraduate School. She is author of Information Warfare and Security, and the recipient of several awards.

U.S. Army, CIA, RAND, ret.

Fred Feer is retired from a career with the U.S. Army counterintelligence, CIA, RAND and independent consulting. Deception has been an interest and area of professional specialization for over 40 years.

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

C

C2
C2S
CDX
CIA
CIP
CPS

I

IA
ICS

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

  • Journal of Information Warfare
    114 Ballard Street
    Yorktown, VA
    23690
  • 757.871.3949
  • jiw@gbpts.com