HackIT: A Human-in-the-Loop Simulation Tool for Realistic Cyber Deception Experiments

被引:5
作者
Aggarwal, Palvi [1 ]
Gautam, Aksh [2 ]
Agarwal, Vaibhav [2 ]
Gonzalez, Cleotilde [1 ]
Dutt, Varun [2 ]
机构
[1] Carnegie Mellon Univ, Dynam Decis Making Lab, Pittsburgh, PA 15213 USA
[2] Indian Inst Technol Mandi, Appl Cognit Sci Lab, Mandi, Himachal Prades, India
来源
ADVANCES IN HUMAN FACTORS IN CYBERSECURITY | 2020年 / 960卷
关键词
Cybersecurity; Simulation tools; Learning; Attack; Hackers; Defenders; Honeypots; ATTACKS;
D O I
10.1007/978-3-030-20488-4_11
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Deception, an art of making someone believe in something that is not true, may provide a promising real-time solution against cyber-attacks. In this paper, we propose a human-in-the-loop real-world simulation tool called HackIT, which could be configured to create different cyber-security scenarios involving deception. We discuss how researchers can use HackIT to create networks of different sizes; use deception and configure different webservers as honeypots; and, create any number of fictitious ports, services, fake operating systems, and fake files on honeypots. Next, we report a case-study involving HackIT where adversaries were tasked with stealing information from a simulated network over multiple rounds. In one condition in HackIT, deception occurred early; and, in the other condition, it occurred late. Results revealed that participants used different attack strategies across the two conditions. We discuss the potential of using HackIT in helping cyber-security teams understand adversarial cognition in the laboratory.
引用
收藏
页码:109 / 121
页数:13
相关论文
共 13 条
[1]   Deceiving Network Reconnaissance Using SDN-Based Virtual Topologies [J].
Achleitner, Stefan ;
La Porta, Thomas F. ;
McDaniel, Patrick ;
Sugrim, Shridatt ;
Krishnamurthy, Srikanth V. ;
Chadha, Ritu .
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2017, 14 (04) :1098-1112
[2]  
Aggarwal Palvi, 2015, 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA). Proceedings, P1, DOI 10.1109/CyberSA.2015.7166127
[3]  
Aggarwal P., 2016, Advances in Human Factors in Cybersecurity. AISC, P85, DOI [DOI 10.1007/978-3-319-41932-9_8, DOI 10.1007/978-3-319-41932-9]
[4]  
Aggarwal P, 2016, 2016 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBERSA)
[5]  
Aggarwal P, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS)
[6]  
[Anonymous], P 1 INT C SIM TOOLS
[7]  
[Anonymous], 2022, SECURITY GAME THEORY
[8]  
[Anonymous], HDB COMPUTER NETWORK
[9]   Cyber Situation Awareness: Modeling Detection of Cyber Attacks With Instance-Based Learning Theory [J].
Dutt, Varun ;
Ahn, Young-Suk ;
Gonzalez, Cleotilde .
HUMAN FACTORS, 2013, 55 (03) :605-618
[10]  
Issariyakul Teerawat, 2009, INTRO NETWORK SIMULA, P1