WiP: Deception-in-Depth Using Multiple Layers of Deception

Jason Landsborough,Neil C. Rowe,Thuy D. Nguyen,Sunny Fugate
2024-12-21
Abstract:Deception is being increasingly explored as a cyberdefense strategy to protect operational systems. We are studying implementation of deception-in-depth strategies with initially three logical layers: network, host, and data. We draw ideas from military deception, network orchestration, software deception, file deception, fake honeypots, and moving-target defenses. We are building a prototype representing our ideas and will be testing it in several adversarial environments. We hope to show that deploying a broad range of deception techniques can be more effective in protecting systems than deploying single techniques. Unlike traditional deception methods that try to encourage active engagement from attackers to collect intelligence, we focus on deceptions that can be used on real machines to discourage attacks.
Cryptography and Security
What problem does this paper attempt to address?