Understanding the Application of Deception in Network Security
ABSTRACT
Deception techniques are often employed as part of a proactive and preventative measure of security. However, its application in security has seldom been expressed with a defining explanation of the actual deception. This paper will present a discourse on the existence of deceptions in nature to construct a model that has application to network deceptions. A model of deception will be developed with the intention of applying the delineated actions of deceit, deception, and deceiving to a wireless honeypot. In a future experiment, a research goal will be to establish associations between deceptions deployed and the attainment of network defense goals through implementation of the model of deception.
AUTHORS
School of Computer and Information Science, Edith Cowan University
Australia
Suen Yek is a doctoral candidate within the School of Computer and Information Science at Edith Cowan University in Perth, Western Australia. Her research is on wireless honeynets and the application of deceptive mechanisms for countermeasures against network attacks. Suen holds a Bachelor of Science (Software Engineering) with Honours and a Bachelor of Business (Marketing).
Published In
Keywords
Journal of Information Warfare
The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.
Quick Links
Archive