Visual modeling of cyber deception

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Deception-based defense relies on deliberated actions to manipulate the attackers' perception of a system. It requires careful planning and application of multiple techniques to be effective. Therefore, deceptive strategies should be studied in isolation from the traditional security mechanisms. To support this goal, we develop DML, a visual language for deception modeling, offering three complementary views of deception: requirements model, deception tactics feature model, and deception strategy organizational. DML integrates goal-oriented requirements models and threat models to compose a comprehensive model considering the influences of developing deceptive mechanisms and the associated risks. The feasibility of DML is demonstrated via a tool prototype and a set of illustrative scenarios for a web system.

Original languageEnglish
Title of host publicationProceedings - 2018 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2018
EditorsCaitlin Kelleher, Gregor Engels, Joao Paulo Fernandes, Jacome Cunha, Jorge Mendes
PublisherIEEE Computer Society
Pages205-209
Number of pages5
ISBN (Electronic)978-153864235-1
DOIs
Publication statusPublished - 23 Oct 2018
Event2018 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2018 - Lisbon, Portugal
Duration: 1 Oct 20184 Oct 2018

Publication series

NameProceedings - IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)
PublisherIEEE Computer Society
Volume2018-October
ISSN (Print)1943-6092

Conference

Conference2018 IEEE Symposium on Visual Languages and Human-Centric Computing, VL/HCC 2018
CountryPortugal
CityLisbon
Period1/10/184/10/18

Keywords

  • Network security
  • Intrusion detection
  • Computer crime

Fingerprint Dive into the research topics of 'Visual modeling of cyber deception'. Together they form a unique fingerprint.

Cite this