Using Deepfake Techniques as an Obfuscation Information Security Defensive Mechanism

Abstract:

This paper proposes a novel, beneficial application of deepfake technology in the realm of moving target obfuscation information security defence mechanisms. This defensive obfuscation technique aims to utilize generative artificial intelligence systems to synthesize honeypot datasets that mimic certain characteristics of sensitive and highly sought-after datasets by threat actors. By synthesizing and intentionally making available realistic but fake datasets within information systems, this novel technique has the potential to (1) mislead threat actors from acquiring their target data during their data breach attempts, and (2) render any corpus of breached datasets useless.


AUTHORS

Photo of Daniel Shin

William & Mary Law School
Williamsburg, Virginia, United States of America

Daniel Shin is a cybersecurity researcher and adjunct professor of law at William & Mary Law School. Mr. Shin is also a cybersecurity researcher for the Center for Legal & Court Technology at William & Mary Law School, and also serves as a research scientist for the Coastal Node Commonwealth Cyber Initiative. His research focuses on the intersection of emerging technology and law, including as it pertains to blockchain technology, the Internet of Things, and Artificial Intelligence, with an emphasis on cybersecurity and privacy. Mr. Shin has presented his research on deep fakes technology, cybersecurity, and the use of AI in the judiciary and the legal profession to judges, court personnel, and practicing attorneys. At William & Mary Law School, he teaches a cutting-edge course introducing law students to fundamental concepts of Artificial Intelligence and other supporting technologies. He is regularly invited to speak at conferences as a subject matter expert.

Mr. Shin is a licensed attorney in Virginia and a Certified Information Privacy Professional, United States (CIPP/US). He is a graduate of Northwestern University (B.A.), Mannheim Universität (M.A.), and William & Mary Law School (J.D.).

Journal of Information Warfare

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

Quick Links

View the latest issue of JIW.

Latest Edition

Purchase a subscription to JIW.

Subscribe

Keywords

A

AI
APT

C

C2
C2S
CDX
CIA
CIP
CPS

D

DNS
DoD
DoS

I

IA
ICS

M

P

PDA

S

SOA

X

XRY

Quill Logo

The definitive publication for the best and latest research and analysis on information warfare, information operations, and cyber crime. Available in traditional hard copy or online.

SUBSCRIBE NOW

Get in touch

Registered Agent and Mailing Address

  • Journal of Information Warfare
  •  ArmisteadTEC
  • Dr Leigh Armistead, President
  • 1624 Wakefield Drive
  • Virginia Beach, VA 23455

 757.510.4574

 JIW@ArmisteadTec.com