Skip to Main Content Area
  • CPS-VO
    • Contact Support
      
 
Not a member?
Click here to register!
Forgot username or password?
 
logo
logo
Science of Security VO
  • Home
  • Archive
  • About
  • Search
  • Calendar
  • Members
  • Contact Us
  • Forums
  • Files
CPS-VO

Visible to the public CfP: HICSS Defensive Cyber Deception Minitrack in Digital GovernmentConflict Detection Enabled

  • View
    No replies
    Wed, 03/13/2019 - 2:54pm
    AdamT
    AdamT's picture
    Offline
    Established Community Member
    Joined: Jul 29 2014

    Deadline: June 15, 2019

    HICSS-53 Defensive Cyber Deception - Call For Papers

    January 7-10, 2020 in Maui, Hawaii

    Description
    Creating a system that is always protected and secure in all situations against all attackers is a far-reaching and likely impossible goal. It is important for researchers to continue to move systems closer towards absolute security, but it is also essential to create techniques so a system can adaptively defend against an attacker who circumvents the current security. Deception for cyber defense starts to get towards that goal--to rebalance the asymmetric nature of computer defense by increasing attacker workload while decreasing that of the defender.

    Cyber deception is one defensive technique that considers the human component of a cyber attack. Deception holds promise as a successful tactic for making an attacker's job harder because it does more than just block access: it can also cause the attacker to waste both time and effort. Moreover, deception can be used by a defender to impart an incorrect belief in the attacker, the effects of which can go beyond any static defense. Understanding the human cognition and behavior of both the cyber defender and cyber attacker is a critical component of cybersecurity.

    In the cyber world, an attacker only knows what is perceived through observation of the target network. The intruder is often thousands of miles away from the network to which he or she is attempting to gain entry. Networks often unintentionally provide more information to an attacker than defenders would like. However, the network owner also has the opportunity to reveal information he or she desires the attacker to know--including deceptive information. Because network information is often complex and incomplete, it provides a natural environment in which to imbed deception since, in chaos, there is opportunity. Deception can alter the mindset, confidence, and decision-making process of an attacker, which can have more significant effects than traditional defenses. Furthermore, using deception for defensive purposes gives the defender at least partial control of what an attacker knows, which can provide opportunities for strategic interaction with an attacker.

    These research efforts require an interdisciplinary approach and track is soliciting papers across multiple disciplines. It is essential to understand attacker and defender cognition and behavior to effectively and strategically induce cognitive biases and increase cognitive load, making our systems difficult to attack.

    Topics of interest include (but are not limited to):

    • Science of Deception (e.g., evaluation techniques, deception frameworks applied to cyber);
    • Practice of Cyber Deception (e.g., case studies, deception technology, deception detection);
    • Understanding/influencing the cyber adversary (e.g., adversary emulation, measures of effectiveness);
    • Psychological and social-cultural adversarial mental models that can be used to estimate and predict adversarial mental states and decision processes;
    • Cognitive Modeling of cyber tasks;
    • Adversary observation/learning schemes through both active multilevel
    • "honey bait" systems and passive watching, in conjunction with active learning and reasoning to deal with partial information and uncertainties;
    • Oppositional Human Factors to induce cognitive biases and increase cognitive load for cyber attackers;
    • Metrics for quantifying deception effectiveness in driving adversary mental state and in determining optimized deception information composition and projection;
    • Experimental Design, approaches, and results;
    • Theoretical formulation for a one-shot or multiple rounds of attacker/defender interaction models;
    • Identification of social/cultural factors in mental state estimation and decision manipulation process;
    • Cyber maneuver and adaptive defenses;
    • Protecting our autonomous systems from being deceived;
    • Policy hurdles, solutions, and case studies in adoption of cyber deception technologies.

    Chair:
    Kimberly Ferguson-Walter
    Department of Defense
    Kimberly.ferguson-wa@navy.mil

    Co-Chairs:
    Sunny Fugate
    Naval Information Warfare Center Pacific
    fugate@spawar.navy.mil

    Cliff Wang
    Army Research Office
    xiaogang.x.wang.civ@mail.mil

    ‹ CfP: 10th Conference on Decision and Game Theory for Security (GameSec 2019) CfP: The Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) ›
    Top
    • PDF version
    • Printer-friendly version

    Terms of Use  |  ©2023. CPS-VO