Skip to main content

HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the Laboratory

  • Chapter
  • First Online:
Handbook of Computer Networks and Cyber Security

Abstract

Computer-based simulation tools have an important role to play in helping us understand the behavior of people performing as attackers (people who launch cyberattacks) and defenders (people who protects computer networks against cyberattacks) in complex cyber situations. In this paper, we introduce a simulation tool called HackIt that could be used to build dynamic cyberattack scenarios. We used the HackIt tool to investigate the influence of timing of deception strategies involving honeypots (computers that pretend to be real, but those that are actually fake) on the decisions of participants performing as attackers. In a lab-based experiment, participants performing as attackers were randomly assigned to two between-subjects conditions, each involving six repeated games: early (N = 20) and late (N = 20). In early condition, deception was present via honeypots on the second and third games, whereas in late condition, deception was present via honeypots on the fourth and fifth games. Presence of deception meant that the honeypots were easy to exploit in deception rounds. In both conditions, the goal of attacker was to steal credit-card information for computers on the network. Results revealed that the proportion of honeypot attacks were higher in late condition compared to early condition. Similarly, we found that the proportion of regular attacks were lower in late condition compared to early condition. We highlight the potential of using the HackIt tool for creating realistic cyberscenarios and evaluating the effectiveness of different deception strategies in reducing cyberattacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 299.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Trustwave global Security Report. (2015). Retrieved from https://www2.trustwave.com/rs/815-RFM-693/images/2015_TrustwaveGlobalSecurityReport.pdf

  2. Symantec Corporation. (2014). Internet security threat report. Retrieved from http://www.symantec.com/content/en/us/enterprise/other_resources/bistr_main_report_v19_21291018.en-us.pdf

  3. Whaley, B. (1982). Toward a general theory of deception. Journal of Strategic Studies, 5(1), 178–192.

    Article  Google Scholar 

  4. Denning, D. (1999). Information warfare and security. New York: Addison Wesley.

    Google Scholar 

  5. Mitnick, K. D., & Simon, W. L. (2011). The art of deception: Controlling the human element of security. Indianapolis, IN: John Wiley & Sons.

    Google Scholar 

  6. Glantz, D. (1989). Military deception in the second world war (Cass series on soviet military theory and practice). London: Routledge. isbn:ISBN 978-0-714-63347-3.

    Google Scholar 

  7. Rowe, N. C., & Custy, E. J. (2008). Deception in cyber-attacks. In Cyber warfare and cyber terrorism. Hershey, PA: Information Science Reference.

    Google Scholar 

  8. Cohen, F. (1998). The deception toolkit. Risks Digest, 19.

    Google Scholar 

  9. Rowe, N. C. (2003, June). Counter planning deceptions to foil cyber-attack plans. In IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, 2003 (pp. 203–210). IEEE.

    Google Scholar 

  10. Heckman, K. E., Walsh, M. J., Stech, F. J., O'boyle, T. A., DiCato, S. R., & Herber, A. F. (2013). Active cyber defense with denial and deception: A cyber-wargame experiment. Computers & Security, 37, 72–77.

    Article  Google Scholar 

  11. Spitzner, L. (2003). The honeynet project trapping the hackers. IEEE Security & Privacy, 99(2), 15–23.

    Article  Google Scholar 

  12. Qassrawi, M. T., & Zhang, H. (2010). Client honeypots: Approaches and challenges. In 4th International Conference on New Trends in Information Science and Service Science (NISS) 2010 (pp. 19–25). IEEE.

    Google Scholar 

  13. Aggarwal, P., Gonzalez, C., & Dutt, V. (2017, June). Modeling the effects of amount and timing of deception in simulated network scenarios. In 2017 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2017), London, UK (pp. 1–7). IEEE.

    Google Scholar 

  14. Aggarwal, P., Gonzalez, C., & Dutt, V. (2016a, June). Looking from the hacker’s perspective: Role of deceptive strategies in cyber security. In 2016 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA 2016), London, UK (pp. 1–6). IEEE.

    Google Scholar 

  15. Garg, N., & Daniel, G. (2007). Deception in honeynets: A game-theoretic analysis. In IEEE SMC Information Assurance and Security Workshop. IAW’07. IEEE.

    Google Scholar 

  16. Aggarwal, P., Gonzalez, C., & Dutt, V. (2016b). Cyber-security: Role of deception in cyber-attack detection. In D. Nicholson (Ed.), Advances in human factors in cybersecurity (pp. 85–96). Cham: Springer.

    Chapter  Google Scholar 

  17. Retrieved from https://www.infosecurity-magazine.com/news/cyberattack-volume-doubled-2017/

Download references

Acknowledgment

Palvi Aggarwal was supported by Visvesverya Ph.D. Scheme for Electronics and IT (IITM/DeitY-MLA/ASO/77), Department of Electronics and Information Technology, Ministry of Communication and IT, Government of India. Cleotilde Gonzalez was supported by the Army Research Laboratory under Cooperative Agreement Number W911NF-13-2-0045 (ARL Cyber Security CRA) to Cleotilde Gonzalez. Varun Dutt was supported by the Department of Science and Technology, Government of India award (award number: SR/CSRI/28/2013(G)) to Varun Dutt. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the Indian or U.S. Government.

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Aggarwal, P., Gonzalez, C., Dutt, V. (2020). HackIt: A Real-Time Simulation Tool for Studying Real-World Cyberattacks in the Laboratory. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds) Handbook of Computer Networks and Cyber Security. Springer, Cham. https://doi.org/10.1007/978-3-030-22277-2_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-22277-2_39

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-22276-5

  • Online ISBN: 978-3-030-22277-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics