Planning and Integrating Deception into Computer Security Defenses

14
Planning and Integrating Deception into Computer Security Defenses NSPW’14 Mohammed Almeshekah [email protected] Eugene Spaord [email protected]

Transcript of Planning and Integrating Deception into Computer Security Defenses

Page 1: Planning and Integrating Deception into Computer Security Defenses

Planning and Integrating Deception into Computer Security Defenses

!

NSPW’14

Mohammed [email protected]

Eugene [email protected]

Page 2: Planning and Integrating Deception into Computer Security Defenses

Deception to Improve Security

• Used as ad-hoc attempt:• Deception has been mainly

used as “trapping” or “deterrence” tools.

• Traditional security (-) and deception (+) work in tandem.

• Three unique advantages:1.Increase entropy of leakage.2.Gain information about

adversaries.3.Gives defenders an edge in

OODA.

Page 3: Planning and Integrating Deception into Computer Security Defenses

Deception Model (1) Strategic Goal

Why are you using this deceptive method?

Page 4: Planning and Integrating Deception into Computer Security Defenses

Deception Model (2) Desired Reaction(s)

What effect(s) do you want to see on the

attacker?

Page 5: Planning and Integrating Deception into Computer Security Defenses

Deception Model (3) Exploit Attacker’s Biases

What are the plausible responses to the attack and which ones should

you use?

Page 6: Planning and Integrating Deception into Computer Security Defenses

Deception Model (4) Apply Deception

Make your system lie

Page 7: Planning and Integrating Deception into Computer Security Defenses

Deception Model (4) Apply Deception

Page 8: Planning and Integrating Deception into Computer Security Defenses

Deception Model (5) Deception Feedback Channels

Define Success and Failure

Page 9: Planning and Integrating Deception into Computer Security Defenses

Deception Model (6) Risk Assessment

Assess the new risks introduced by deception

Page 10: Planning and Integrating Deception into Computer Security Defenses

Deception Model (7) Implementation and Integration

Deceptive components should be part of the real

system

Page 11: Planning and Integrating Deception into Computer Security Defenses

Deception Model (8) Monitoring and Dynamic Adjusting

Continuous monitoring and dynamic adjustment based on the attacker’s

response

Page 12: Planning and Integrating Deception into Computer Security Defenses

Deception Model (8) Monitoring and Dynamic Adjusting

Continuous monitoring and dynamic adjustment based on the attacker’s

response

Page 13: Planning and Integrating Deception into Computer Security Defenses

Deception Model (8) Monitoring and Dynamic Adjusting

Continuous monitoring and dynamic adjustment based on the attacker’s

response

Page 14: Planning and Integrating Deception into Computer Security Defenses

Thanks!@meshekah@TheRealSpaf