Abstract
Computer-based simulation tools have an important role to play in helping us understand the behavior of people performing as attackers (people who launch cyberattacks) and defenders (people who protects computer networks against cyberattacks) in complex cyber situations. In this paper, we introduce a simulation tool called HackIt that could be used to build dynamic cyberattack scenarios. We used the HackIt tool to investigate the influence of timing of deception strategies involving honeypots (computers that pretend to be real, but those that are actually fake) on the decisions of participants performing as attackers. In a lab-based experiment, participants performing as attackers were randomly assigned to two between-subjects conditions, each involving six repeated games: early (N = 20) and late (N = 20). In early condition, deception was present via honeypots on the second and third games, whereas in late condition, deception was present via honeypots on the fourth and fifth games. Presence of deception meant that the honeypots were easy to exploit in deception rounds. In both conditions, the goal of attacker was to steal credit-card information for computers on the network. Results revealed that the proportion of honeypot attacks were higher in late condition compared to early condition. Similarly, we found that the proportion of regular attacks were lower in late condition compared to early condition. We highlight the potential of using the HackIt tool for creating realistic cyberscenarios and evaluating the effectiveness of different deception strategies in reducing cyberattacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Trustwave global Security Report. (2015). Retrieved from https://www2.trustwave.com/rs/815-RFM-693/images/2015_TrustwaveGlobalSecurityReport.pdf
Symantec Corporation. (2014). Internet security threat report. Retrieved from http://www.symantec.com/content/en/us/enterprise/other_resources/bistr_main_report_v19_21291018.en-us.pdf
Whaley, B. (1982). Toward a general theory of deception. Journal of Strategic Studies, 5(1), 178–192.
Denning, D. (1999). Information warfare and security. New York: Addison Wesley.
Mitnick, K. D., & Simon, W. L. (2011). The art of deception: Controlling the human element of security. Indianapolis, IN: John Wiley & Sons.
Glantz, D. (1989). Military deception in the second world war (Cass series on soviet military theory and practice). London: Routledge. isbn:ISBN 978-0-714-63347-3.
Rowe, N. C., & Custy, E. J. (2008). Deception in cyber-attacks. In Cyber warfare and cyber terrorism. Hershey, PA: Information Science Reference.
Cohen, F. (1998). The deception toolkit. Risks Digest, 19.
Rowe, N. C. (2003, June). Counter planning deceptions to foil cyber-attack plans. In IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, 2003 (pp. 203–210). IEEE.
Heckman, K. E., Walsh, M. J., Stech, F. J., O'boyle, T. A., DiCato, S. R., & Herber, A. F. (2013). Active cyber defense with denial and deception: A cyber-wargame experiment. Computers & Security, 37, 72–77.
Spitzner, L. (2003). The honeynet project trapping the hackers. IEEE Security & Privacy, 99(2), 15–23.
Qassrawi, M. T., & Zhang, H. (2010). Client honeypots: Approaches and challenges. In 4th International Conference on New Trends in Information Science and Service Science (NISS) 2010 (pp. 19–25). IEEE.
Aggarwal, P., Gonzalez, C., & Dutt, V. (2017, June). Modeling the effects of amount and timing of deception in simulated network scenarios. In 2017 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2017), London, UK (pp. 1–7). IEEE.
Aggarwal, P., Gonzalez, C., & Dutt, V. (2016a, June). Looking from the hacker’s perspective: Role of deceptive strategies in cyber security. In 2016 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2016), London, UK (pp. 1–6). IEEE.
Garg, N., & Daniel, G. (2007). Deception in honeynets: A game-theoretic analysis. In IEEE SMC Information Assurance and Security Workshop. IAW’07. IEEE.
Aggarwal, P., Gonzalez, C., & Dutt, V. (2016b). Cyber-security: Role of deception in cyber-attack detection. In D. Nicholson (Ed.), Advances in human factors in cybersecurity (pp. 85–96). Cham: Springer.
Retrieved from https://www.infosecurity-magazine.com/news/cyberattack-volume-doubled-2017/
Acknowledgment
Palvi Aggarwal was supported by Visvesverya Ph.D. Scheme for Electronics and IT (IITM/DeitY-MLA/ASO/77), Department of Electronics and Information Technology, Ministry of Communication and IT, Government of India. Cleotilde Gonzalez was supported by the Army Research Laboratory under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA) to Cleotilde Gonzalez. Varun Dutt was supported by the Department of Science and Technology, Government of India award (award number: SR/CSRI/28/2013(G)) to Varun Dutt. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the Indian or U.S. Government.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Aggarwal, P., Gonzalez, C., Dutt, V. (2020). HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the Laboratory. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_39
Download citation
DOI: https://doi.org/10.1007/978-3-030-22277-2_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-22276-5
Online ISBN: 978-3-030-22277-2
eBook Packages: Computer ScienceComputer Science (R0)