Skip to main content

D3CyT: Deceptive Camouflaging for Cyber Threat Detection and Deterrence

  • Conference paper
  • First Online:
Advances in Information and Communication (FICC 2021)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1363))

Included in the following conference series:

  • 1859 Accesses

Abstract

Even the most secure cyber systems could be compromised, and their data could be stolen. Once the data is stolen, even if it is encrypted or hashed, the attackers can conduct offline brute-forcing on it to recover the plaintext without being disrupted or detected. In this paper, we propose D3CyT, a simple, deceptive approach to camouflage sensitive data against such data thefts. In this approach, we transform a sensitive data value (which could be encrypted or hashed) to a deceptive value, called honeyvalue. The honeyvalue is stored instead of the original value, and the key to retrieve the original value from the honeyvalue is stored on a dedicated and secure server. If the data is stolen, the adversary would only attain the honeyvalues. The honeyvalues would either dissuade the attackers from using them by making stolen data look unimportant, or enable detection of data theft in case the attacker uses them. Through three different case studies focused on camouflaging passwords, QR codes, and logged IP addresses, we show the broad usability of our approach in different domains. We also show that even if our deception fails, the system is still technically more secure and computationally as secure as the original system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Hashes.org - shared community password recovery. https://hashes.org/leaks.php. Accessed: 6/15/2019

  2. Marcus Butavicius, Kathryn Parsons, Malcolm Pattinson, and Agata McCormac. Breaching the human firewall: Social engineering in phishing and spear-phishing emails. arXiv preprintarXiv:1606.00887, 2016

  3. Joseph W Caddell. Deception 101-primer on deception. Technical report, ARMY WAR COLL STRATEGIC STUDIES INST CARLISLE BARRACKS PA, 2004

    Google Scholar 

  4. Nilesh Chakraborty and Samrat Mondal.On designing a modified-ui based honeyword generation approach forovercoming the existing limitations. Computers & Security, 66:155–168, 2017.

    Google Scholar 

  5. Kevin P Dyer, Scott E Coull, Thomas Ristenpart, and Thomas Shrimpton. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In 2012 IEEE symposium on security and privacy, pages 332–346. IEEE, 2012

    Google Scholar 

  6. Imran Erguler. Achieving flatness: Selecting the honeywords from existing user passwords. IEEE Transactions on Dependable and Secure Computing,13(2):284–295, 2015.

    Google Scholar 

  7. Xinwen Fu, Yong Guan, Bryan Graham, Riccardo Bettati, and Wei Zhao. Using parasite flows to camouflage flow traffic. In Proceedings of 3rd Annual IEEE Information Assurance Workshop 2002. Citeseer, 2002

    Google Scholar 

  8. Ziya Alper Genc, Süleyman Kardaş, and Mehmet Sabir Kiraz. Examination of a new defense mechanism: Honeywords. In IFIP International Conference on Information Security Theory and Practice, pages 130–139. Springer, 2017

    Google Scholar 

  9. Li Gong. Collisionful keyed hash functions with selectable collisions. Information Processing Letters, 55(3):167–170, 1995.

    Google Scholar 

  10. Seena Gressin. The equifax data breach: What to do. Federal Trade Commission, 8, 2017

    Google Scholar 

  11. Kristin E Heckman, Frank J Stech, Ben S Schmoker, and Roshan K Thomas. Denial and deception in cyber defense. Computer, 48(4):36–44, 2015

    Google Scholar 

  12. Jafar Haadi Jafarian. Cyber agility for attack deterrence and deception. PhD thesis, The University of North Carolina at Charlotte, 2017

    Google Scholar 

  13. Ari Juels and Thomas Ristenpart. Honey encryption: Security beyond the brute-force bound. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, pages 293–310. Springer, 2014

    Google Scholar 

  14. Ari Juels and Ronald L Rivest. Honeywords: Making password-cracking detectable. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 145–160, 2013

    Google Scholar 

  15. Patrick Gage Kelley, Saranga Komanduri, Michelle L Mazurek, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor, and Julio Lopez. Guess again (and again and again): Measuring password strength by simulating password-cracking algorithms. In 2012 IEEE Symposium on Security and Privacy, pages 523–537. IEEE, 2012

    Google Scholar 

  16. Keonwoo Kim. Distributed password cracking on gpu nodes. In 2012 7th International Conference on Computing and Convergence Technology (ICCCT), pages 647–650. IEEE, 2012

    Google Scholar 

  17. Zhuo Lu, Wenye Wang, and Cliff Wang. Camouflage traffic: Minimizing message delay for smart grid applications under jamming. IEEE Transactions on Dependable and Secure Computing, 12(1):31–44, 2014.

    Google Scholar 

  18. Niels Provos et al. A virtual honeypot framework. In USENIX Security Symposium, volume 173, 2004

    Google Scholar 

  19. Cong Pu and Sunho Lim. Spy vs. spy: Camouflage-based active detection in energy harvesting motivated networks. In MILCOM 2015-2015 IEEE Military Communications Conference, pages 903–908. IEEE, 2015

    Google Scholar 

  20. Babak Bashari Rad, Maslin Masrom, and Suhaimi Ibrahim. Camouflage in malware: from encryption to metamorphism. International Journal of Computer Science and Network Security, 12(8):74–83, 2012

    Google Scholar 

  21. Neil Rowe. A taxonomy of deception in cyberspace. In International Conference on Information Warfare and Security, pages 173–181, 2006

    Google Scholar 

  22. Saqib Ubaid, M Farrukh Shafeeq, Majid Hussain, Ali Hammad Akbar, Abdelrahman Abuarqoub, M Sultan Zia, and Beenish Abbas. Scout: A sink camouflage and concealed data delivery paradigm for circumvention of sink-targeted cyber threats in wireless sensor networks. The Journal of Supercomputing, 74(10):5022–5040, 2018

    Google Scholar 

  23. Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, and Xinyi Huang. A security analysis of honeywords. In NDSS, 2018

    Google Scholar 

  24. Barton Whaley. Toward a general theory of deception. The Journal of Strategic Studies, 5(1):178–192, 1982.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kuntal Das .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Das, K., Gethner, E., Dincelli, E., Jafarian, J.H. (2021). D3CyT: Deceptive Camouflaging for Cyber Threat Detection and Deterrence. In: Arai, K. (eds) Advances in Information and Communication. FICC 2021. Advances in Intelligent Systems and Computing, vol 1363. Springer, Cham. https://doi.org/10.1007/978-3-030-73100-7_54

Download citation

Publish with us

Policies and ethics