Your one-stop web resource providing safety and security information to manufacturers

How to deceive a deceiver is the very question security professionals are asking when they set up a defense against any kind of potential attack.

In an effort to make cyber deception a more effective tool against malicious hackers, Binghamton University, State University of New York Assistant Professor of Computer Science Guanhua Yan and PhD student Zhan Shu are working on a way to confuse attackers.

Facial Recognition Software Quality Advancing
Game Theory to Quantify Grid Cyber Threats
Human Side of Cyber-Physical Systems
Next-Gen Security for IoT

They developed a study inspired by the 2013 Target data breach that affected 41 million consumers and cost Target $18.5 million, and the 2017 Equifax hack which exposed the personal information of 147.7 million Americans. Both of those attacks were Advanced Persistent Threats (APTs).

Yan and Shu wanted to improve the ways in which hackers are countered when attempting APTs, so they focused on refining existing cyber deception tools.

Schneider Bold

Cyber deception is a responsive technique that puts malicious hackers into a fake environment once the system detects a hack in progress.

In the abstract of the study, the researchers wrote “the main objective of our work is to ensure deception consistency: When the attackers are trapped, they can only make observations that are consistent with what they have seen already so that they cannot recognize the deceptive environment.”

They found this focus on only showing attackers what has been seen before increases the efficiency of the deception.

“The issue is that sometimes cyber deception uses what are called ‘bad lies’ that are easily recognizable by the attacker. Once the deception is realized, the attacker can adjust and work around this form of protection,” Yan said.

The deception consistency method that Yan and Shu created was tested on college students who had recently completed a cybersecurity course. The students were asked to act like malicious hackers, with some ending up in the deceptive environment.

The researchers found because the deceptive environment was consistent with what students had previously seen, most did not realize they had entered into the deception.

“It was clear that most students were simply guessing whether they had entered into the deceptive environment or not. They couldn’t quite tell the difference when we used our consistent model,” Yan said.

Although the deception consistency may make it more difficult for APT attackers to recognize the deception, the researchers were clear their proposed method is not a cure-all for things like what happened to Target and Equifax.

“It may not hold up against more advanced attacks, but we will continue to improve the effectiveness of the deception-based methods against a variety of attack scenarios,” Yan said.

Pin It on Pinterest

Share This