Abstract
The concept of deception has been practised in human conflicts ever since they existed, but its application to an information security environment could only be witnessed in the early 1990s onwards. Since then, different deception techniques have also been introduced to the Computer Network Operations (CNO) environment, in order to achieve desired outcome(s). In the recent years, a number of researchers have investigated in different deception techniques used in computer based networks but more consideration is needed in exploring the strategic deception in a Computer Network Defence (CND) environment. To date, there are no models available that would allow strategic deception in a CNO environment and therefore building such model would be a great achievement. This paper aims to establish an understanding of the role of deception in a CNO environment and will also discuss a draft concept of a deception model that will allow strategic deception in a CNO environment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Busuttil, T. & Warren, M. (2003). A Review of critical Information Infrastructure Protection within IT Security Guidelines, 4th Australian Information warfare and IT security Conference 2003.
Campen, A. D. and D. H. Dearth (1998). Cyberwar 2.0: Myths, Mysteries and Reality. Fairfax, Virginia, AFCEA International Press
Cohen, F & Lambert, D. (2001). A Framework for Deception, [online], http://all.net/journal/deception/Framework/Framework.html
Gerwehr, S. & Glenn, R. W. (2003). Unweaving the Web: Deception and Adoption in Future Urban Operations, Rand, Santa Monica.
Gupta, N. (2003). Improving the Effectiveness of Deceptive Honeynets through an Empirical Learning Approach, [online], http://www.infosecwriters.com/text_resources/pdf/Gupta_Honeynets.pdf
JCS. (1996). Joint Doctrine for Military Deception, Joint Pub 3–58, [online], http://www.fas.org/irp/doddir/dod/ip3_58.pdf
Lambert, D. (1987). A Cognitive Model for Exposition of Human Deception and Counterdeception), [online], http://jps.lanl.gov/voll_issl/5Cognitive_Model_of_Deception.pdf
Mitnick, K. D. & Simon, W. L. (2002). The Art of Deception. Indianapolis, USA, Wiley Publishing
Rue, L. (1994). By The Grace ff Guile: The Role of Deception in Natural History and Human Affairs. New York: Oxford University Press.
Spitzner, L. (2003). Honeypots-Tracking Hackers. Boston: Pearson Education Inc.
(United States Joint Forces Command Glossary, Undated). [online], http://www.jfcom.mil/about/glossarv.htm
Waltz, E. (1998). Information Warfare. Norwood, USA, Artech House
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag London Limited
About this paper
Cite this paper
Kazmi, Z., Vidalis, S. (2006). A Model of Deploying Deception in a Computer Network Operations (CNO) Environment. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_9
Download citation
DOI: https://doi.org/10.1007/1-84628-352-3_9
Publisher Name: Springer, London
Print ISBN: 978-1-84628-311-6
Online ISBN: 978-1-84628-352-9
eBook Packages: Computer ScienceComputer Science (R0)