Goal-Driven Deception Tactics Design

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

9 Citations (Scopus)

Abstract

Deception-based defense relies on intentional actions employed to induce erroneous inferences on attackers. Existing deception approaches are included in the software development process in an ad-hoc fashion, and are fundamentally realized as single tools or entire solutions repackaged as honeypot machines. We propose a systematic goal-driven approach to include deception tactics early in the software development process so that conflicts and risks can be found in the initial phases of the development, reducing costs of ill-planed decisions. The process integrates three phases: system modeling (producing a goal model of the application domain), security modeling (producing a threat model specifying the typical security concerns from the attacker perspective), and deception modeling (producing a deception tactic model, a variability model, and deception story models). The feasibility of the proposed approach is shown via a case study where deception defense strategies are designed for a students' presence control system for our University.
Original languageEnglish
Title of host publicationSoftware Reliability Engineering (ISSRE), 2016 IEEE 27th International Symposium on
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages 264-275
ISBN (Electronic)978-1-4673-9002-6
DOIs
Publication statusPublished - 2016
Event27th IEEE International Symposium on Software Reliability Engineering, ISSRE 2016 - Ottawa
Duration: 23 Oct 201627 Oct 2016

Conference

Conference27th IEEE International Symposium on Software Reliability Engineering, ISSRE 2016
CityOttawa
Period23/10/1627/10/16

Keywords

  • computer security
  • deception
  • software design

Fingerprint

Dive into the research topics of 'Goal-Driven Deception Tactics Design'. Together they form a unique fingerprint.

Cite this