Literature Survey: Deception and Counter-Deception in Cyber

This will be a literature survey of denial, deception, and counter-deception in the cyber domain. I am currently in the process of collecting references.

References

  1. Al-Shaer, E., & Gillani, S. F. (2016). Agile Virtual Infrastructure for Cyber Deception Against Stealthy DDoS Attacks. In S. Jajodia, V. S. Subrahmanian, V. Swarup, & C. Wang (Eds.), Cyber Deception: Building the Scientific Foundation (pp. 233–257). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_10
  2. Araujo, F., & Hamlen, K. W. (2016). Embedded Honeypotting. In S. Jajodia, V. S. Subrahmanian, V. Swarup, & C. Wang (Eds.), Cyber Deception: Building the Scientific Foundation (pp. 201–231). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_9
  3. Briskin, G., Fayette, D., Evancich, N., Rajabian-Schwart, V., Macera, A., & Li, J. (2016). Design Considerations for Building Cyber Deception Systems. In S. Jajodia, V. S. Subrahmanian, V. Swarup, & C. Wang (Eds.), Cyber Deception: Building the Scientific Foundation (pp. 69–95). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_4
  4. Climek, D., Macera, A., & Tirenin, W. (2016). Cyber Deception. Journal of Cyber Security & Information Systems, 4(1), 14–17.
  5. Cybenko, G., Stocco, G., & Sweeney, P. (2016). Quantifying Covertness in Deceptive Cyber Operations. In S. Jajodia, V. S. Subrahmanian, V. Swarup, & C. Wang (Eds.), Cyber Deception: Building the Scientific Foundation (pp. 51–67). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_3
  6. Ferguson-Walter, K., Fugate, S., Mauger, J., & Major, M. (2018). Game Theory for Adaptive Defensive Cyber Deception, 22.
  7. Heckman, K. E., Stech, F. J., Thomas, R. K., Schmoker, B., & Tsow, A. W. (2015). Cyber Denial, Deception and Counter Deception. Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-25133-2
  8. Jajodia, S. (Ed.). (2011). Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats. New York: Springer.
  9. Lu, Z., Wang, C., & Wei, M. (2016). A Proactive and Deceptive Perspective for Role Detection and Concealment in Wireless Networks. In S. Jajodia, V. S. Subrahmanian, V. Swarup, & C. Wang (Eds.), Cyber Deception: Building the Scientific Foundation (pp. 97–114). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_5
  10. Neagoe, V., & Bishop, M. (2006). Inconsistency in Deception for Defense. In NSPW. https://doi.org/10.1145/1278940.1278946
  11. Nunes, E., Kulkarni, N., Shakarian, P., Ruef, A., & Little, J. (2016). Cyber-Deception and Attribution in Capture-the-Flag Exercises. In S. Jajodia, V. S. Subrahmanian, V. Swarup, & C. Wang (Eds.), Cyber Deception: Building the Scientific Foundation (pp. 149–165). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_7
  12. Qassrawi, M. T., & Hongli, Z. (2010). Deception Methodology in Virtual Honeypots. In Proceedings of the 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing – Volume 02 (pp. 462–467). Washington, DC, USA: IEEE Computer Society. https://doi.org/10.1109/NSWCTC.2010.266
  13. Rowe, N. C. (2004). A Model of Deception during Cyber-Attacks on Information Systems. Monterey, California. Naval Postgraduate School. Retrieved from https://calhoun.nps.edu/handle/10945/35974
  14. Rowe, N. (2007). Deception in Defense of Computer Systems from Cyber Attack. https://doi.org/10.4018/9781591409915.ch013
  15. Rowe, N., & Rrushi, J. (2016). Introduction to Cyberdeception. Springer International Publishing. Retrieved from https://www.springer.com/us/book/9783319411859
  16. Stech, F. J., Heckman, K. E., & Strom, B. E. (2016). Integrating Cyber-D&D into Adversary Modeling for Active Cyber Defense. In S. Jajodia, V. S. Subrahmanian, V. Swarup, & C. Wang (Eds.), Cyber Deception: Building the Scientific Foundation (pp. 1–22). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_1
  17. Underbrink, A. J. (2016). Effective Cyber Deception. In S. Jajodia, V. S. Subrahmanian, V. Swarup, & C. Wang (Eds.), Cyber Deception: Building the Scientific Foundation (pp. 115–147). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-32699-3_6
  18. Wang, C., & Lu, Z. (2018). Cyber Deception: Overview and the Road Ahead. IEEE Security & Privacy, 16(2), 80–85. https://doi.org/10.1109/MSP.2018.1870866

 

Leave a Reply

Your email address will not be published. Required fields are marked *