Abstract
Cyberattackers must almost necessarily use deceptions. That is because cybersystems are generally well-designed and robust to most attempts to misuse them. The only way around most of these protections is to deceive someone or some system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boese A (2006) Hippo easts dwarf: A field guide to hoaxes and other b.s. Harcourt, Orlando, FL
Conti G, Sobiesk E (2010) Malicious interface design: exploiting the user. In: Proceedings of international World Wide Web conference, 26–30 Apr 2010, Raleigh, NC, US. pp 271–280
Jakobsson M, Myers S (eds) (2006) Phishing and countermeasures: understanding the increasing problem of electronic identity theft. Wiley-Interscience, New York
Poulsen K (2012) Kingpin: how one hacker took over the billion-dollar cybercrime underground. Broadway, New York
Ptacek T, Newsham T (1998) Insertion, evasion, and denial of service: eluding network intrusion detection. Technical Report. Secure Networks Inc. Available at www.dtic.mil/dtic/tr/fulltext/u2/a391565.pdf
Rowe N (2006) A taxonomy of deception in cyberspace. In: Proceedings of the international conference on information warfare and security, Princess Anne, MD, 15–16 Mar. pp 173–181
Rowe N, Garfinkel S, Beverly R, Yannakogeorgos P (2011) Challenges in monitoring cyberarms compliance. International. J Cyber Warfare Terrorism 1(1):11–14
Seife C (2015) Virtual unreality: the new era of digital deception. Penguin, New York
Spafford E (1992) Are computer hacker break-ins ethical? J Syst Softw 17:41–47
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Rowe, N.C., Rrushi, J. (2016). Deception Methods for Offense. In: Introduction to Cyberdeception. Springer, Cham. https://doi.org/10.1007/978-3-319-41187-3_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-41187-3_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-41185-9
Online ISBN: 978-3-319-41187-3
eBook Packages: Computer ScienceComputer Science (R0)