Extractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception

Mohammed Noraden Alsaleh, Jinpeng Wei*, Ehab Al-Shaer, Mohiuddin Ahme

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

3 Scopus citations

Abstract

The lack of agility in cyber defense gives adversaries a significant advantage for discovering cyber targets and planning their attacks in stealthy and undetectable manner. While it is very hard to detect or predict attacks, adversaries can always scan the network, learn about countermeasures, and develop new evasion techniques. Active Cyber Deception (ACD) has emerged as effective means to reverse this asymmetry in cyber warfare by dynamically orchestrating the cyber deception environment to mislead attackers and corrupting their decision-making process. However, developing an efficient active deception environment usually requires human intelligence and analysis to characterize the attackers’ behaviors (e.g., malware actions). This manual process significantly limits the capability of cyber deception to actively respond to new attacks (malware) and in a timely manner.

Original languageEnglish
Title of host publicationAutonomous Cyber Deception
Subtitle of host publicationReasoning, Adaptive Planning, and Evaluation of HoneyThings
PublisherSpringer International Publishing
Pages185-207
Number of pages23
ISBN (Electronic)9783030021108
ISBN (Print)9783030021092
DOIs
StatePublished - 1 Jan 2019
Externally publishedYes

Bibliographical note

Publisher Copyright:
© Springer Nature Switzerland AG 2019, corrected publication 2019

ASJC Scopus subject areas

  • General Computer Science

Fingerprint

Dive into the research topics of 'Extractor: Automated Extraction of Malware Deception Parameters for Autonomous Cyber Deception'. Together they form a unique fingerprint.

Cite this