Skip to main content

Deception Methods for Offense

  • Chapter
  • First Online:
Introduction to Cyberdeception
  • 1492 Accesses

Abstract

Cyberattackers must almost necessarily use deceptions. That is because cybersystems are generally well-designed and robust to most attempts to misuse them. The only way around most of these protections is to deceive someone or some system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 79.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Boese A (2006) Hippo easts dwarf: A field guide to hoaxes and other b.s. Harcourt, Orlando, FL

    Google Scholar 

  • Conti G, Sobiesk E (2010) Malicious interface design: exploiting the user. In: Proceedings of international World Wide Web conference, 26–30 Apr 2010, Raleigh, NC, US. pp 271–280

    Google Scholar 

  • Jakobsson M, Myers S (eds) (2006) Phishing and countermeasures: understanding the increasing problem of electronic identity theft. Wiley-Interscience, New York

    Google Scholar 

  • Poulsen K (2012) Kingpin: how one hacker took over the billion-dollar cybercrime underground. Broadway, New York

    Google Scholar 

  • Ptacek T, Newsham T (1998) Insertion, evasion, and denial of service: eluding network intrusion detection. Technical Report. Secure Networks Inc. Available at www.dtic.mil/dtic/tr/fulltext/u2/a391565.pdf

  • Rowe N (2006) A taxonomy of deception in cyberspace. In: Proceedings of the international conference on information warfare and security, Princess Anne, MD, 15–16 Mar. pp 173–181

    Google Scholar 

  • Rowe N, Garfinkel S, Beverly R, Yannakogeorgos P (2011) Challenges in monitoring cyberarms compliance. International. J Cyber Warfare Terrorism 1(1):11–14

    Google Scholar 

  • Seife C (2015) Virtual unreality: the new era of digital deception. Penguin, New York

    Google Scholar 

  • Spafford E (1992) Are computer hacker break-ins ethical? J Syst Softw 17:41–47

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Rowe, N.C., Rrushi, J. (2016). Deception Methods for Offense. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-41187-3_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-41185-9

  • Online ISBN: 978-3-319-41187-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics