Skip to main content

A Model of Deploying Deception in a Computer Network Operations (CNO) Environment

  • Conference paper
EC2ND 2005
  • 352 Accesses

Abstract

The concept of deception has been practised in human conflicts ever since they existed, but its application to an information security environment could only be witnessed in the early 1990s onwards. Since then, different deception techniques have also been introduced to the Computer Network Operations (CNO) environment, in order to achieve desired outcome(s). In the recent years, a number of researchers have investigated in different deception techniques used in computer based networks but more consideration is needed in exploring the strategic deception in a Computer Network Defence (CND) environment. To date, there are no models available that would allow strategic deception in a CNO environment and therefore building such model would be a great achievement. This paper aims to establish an understanding of the role of deception in a CNO environment and will also discuss a draft concept of a deception model that will allow strategic deception in a CNO environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Busuttil, T. & Warren, M. (2003). A Review of critical Information Infrastructure Protection within IT Security Guidelines, 4th Australian Information warfare and IT security Conference 2003.

    Google Scholar 

  2. Campen, A. D. and D. H. Dearth (1998). Cyberwar 2.0: Myths, Mysteries and Reality. Fairfax, Virginia, AFCEA International Press

    Google Scholar 

  3. Cohen, F & Lambert, D. (2001). A Framework for Deception, [online], http://all.net/journal/deception/Framework/Framework.html

    Google Scholar 

  4. Gerwehr, S. & Glenn, R. W. (2003). Unweaving the Web: Deception and Adoption in Future Urban Operations, Rand, Santa Monica.

    Google Scholar 

  5. Gupta, N. (2003). Improving the Effectiveness of Deceptive Honeynets through an Empirical Learning Approach, [online], http://www.infosecwriters.com/text_resources/pdf/Gupta_Honeynets.pdf

    Google Scholar 

  6. JCS. (1996). Joint Doctrine for Military Deception, Joint Pub 3–58, [online], http://www.fas.org/irp/doddir/dod/ip3_58.pdf

    Google Scholar 

  7. Lambert, D. (1987). A Cognitive Model for Exposition of Human Deception and Counterdeception), [online], http://jps.lanl.gov/voll_issl/5Cognitive_Model_of_Deception.pdf

    Google Scholar 

  8. Mitnick, K. D. & Simon, W. L. (2002). The Art of Deception. Indianapolis, USA, Wiley Publishing

    Google Scholar 

  9. Rue, L. (1994). By The Grace ff Guile: The Role of Deception in Natural History and Human Affairs. New York: Oxford University Press.

    Google Scholar 

  10. Spitzner, L. (2003). Honeypots-Tracking Hackers. Boston: Pearson Education Inc.

    Google Scholar 

  11. (United States Joint Forces Command Glossary, Undated). [online], http://www.jfcom.mil/about/glossarv.htm

    Google Scholar 

  12. Waltz, E. (1998). Information Warfare. Norwood, USA, Artech House

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag London Limited

About this paper

Cite this paper

Kazmi, Z., Vidalis, S. (2006). A Model of Deploying Deception in a Computer Network Operations (CNO) Environment. In: Blyth, A. (eds) EC2ND 2005. Springer, London. https://doi.org/10.1007/1-84628-352-3_9

Download citation

  • DOI: https://doi.org/10.1007/1-84628-352-3_9

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-84628-311-6

  • Online ISBN: 978-1-84628-352-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics