The Use of Deception Techniques: Honeypots and Decoys
Fred Cohen, University of New Haven
Cognitive Deception Background
Theoretical Results on Deceptions
Models of Deception Effectiveness
A Model for Deception of Computers
Effects of Deceptions on Human Attackers
Models of Deception of More Complex Systems
Experiments and the Need for an Experimental Basis
Experiments We Believe Are Needed at This Time
Summary, Conclusions, and Further Work
BACKGROUND AND HISTORY
Honeypots and other sorts of decoys are systems or components intended to cause malicious actors to attack the wrong targets. Along the way, they produce potentially useful information for defenders.
Deception Fundamentals
According to the American Heritage Dictionary of the English Language deception is defined as the act of deceit and deceit is defined as deception.
Fundamentally, deception exploits errors in cognitive systems for advantage. It is achieved by systematically inducing and suppressing signals entering the target cognitive system. There have been many approaches to the identification of cognitive errors and methods for their exploitation, and some of these are explored here; for more thorough coverage, see Cohen, Lambert, Preston, Berry, Stewart, & Thomas (2001a). Honeypots and decoys ...
Get Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.