Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space

نویسندگان

  • Frank J. Stech
  • Kristin E. Heckman
  • Phil Hilliard
  • Janice Redington Ballo
چکیده

The concepts of deception, counter-deception, and deception detection in the cyber-space domain have been the subject of little systematic analysis. Our objective was to conduct scientometric analyses of these concepts in the cyber-space domain. We observed the following: Although various deceptive tactics are addressed in the cyber-security literature, it appears they are characterized more from the standpoint of technology than from their social, behavioral, or cognitive elements; these cyber-tactics are not mapped into the classic components of denial and deception tactics; there is no conventional terminology to describe the phenomenon of deception in cyber-space; classic deception domain terminology is rarely used; and classic deception domain researchers are rarely cited. These observations suggest that cyber-deception is an emerging field.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Contextual Binding and Deception Detection

Deception is frequently used in cyber attacks. Detecting deception is always a challenge, as witnessed in attacks in social media and other online environments. Contexts can help to identify deception. Unfortunately, there is not much literature available in this aspect. This paper explores the unique properties of contextual binding. It examines roles that it plays. It also proposes a novel ap...

متن کامل

Argument Formation in the Reasoning Process: Toward a Generic Model of Deception Detection

Research on deception detection has been mainly focused on two kinds of approaches. In one, people consider deception types and taxonomies, and use different counter strategies to detect and reverse deception. In the other, people search for verbal and non-verbal cues in the content of deceptive communication. However, general theories that study fundamental properties of deception which can be...

متن کامل

Using Bayesian Attack Detection Models to Drive Cyber Deception

We present a method to devise, execute, and assess a cyber deception. The aim is to cause an adversary to believe they are under a cyber attack when in fact they are not. Cyber network defense relies on human and computational systems that can reason over multiple individual evidentiary items to detect the presence of meta events, i.e., cyber attacks. Many of these systems aggregate and reason ...

متن کامل

Refined Concepts of Massive and Flexible Cyber Attacks with Information Warfare Strategies

—The purpose of this research is to deepen the concepts of massive and respectively flexible cyber-attacks. These two concepts have been connected with three macroeconomic dimensions, cost for national security, public and private cost for nonmilitary and cost for productive investment to indicate the economic state of the actor state, as well as his motivation to choose a mechanism of cyber s...

متن کامل

Deception in defense of computer systems from cyber-attack

While computer systems can be quite susceptible to deception by attackers, deception by defenders has increasingly been investigated in recent years. Military history has classic examples of defensive deceptions, but not all tactics and strategies have analogies in cyberspace. Honeypots are the most important example today; they are decoy computer systems designed to encourage attacks to collec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • PsychNology Journal

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2011