메뉴 건너뛰기




Volumn , Issue , 2006, Pages 173-181

A taxonomy of deception in cyberspace

Author keywords

Case grammar; Cyberspace; Deception; Defense; Taxonomy

Indexed keywords

CRIME; SEMANTICS; TAXONOMIES;

EID: 84896280244     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (31)

References (27)
  • 1
    • 0003586486 scopus 로고
    • How to Do Things with Words
    • 2nd edition, ed. Urmson, J., & Sbis, M., Oxford University Press, Oxford
    • Austin, J. L. (1975) How to Do Things with Words, 2nd edition, ed. Urmson, J., & Sbis, M., Oxford University Press, Oxford.
    • (1975)
    • Austin, J.L.1
  • 2
    • 0042183041 scopus 로고
    • Cheating and Deception
    • Transaction Publishers, New Brunswick, New Jersey
    • Bell, J. B., & Whaley, B. (1991) Cheating and Deception, Transaction Publishers, New Brunswick, New Jersey.
    • (1991)
    • Bell, J.B.1    Whaley, B.2
  • 3
    • 0008390875 scopus 로고    scopus 로고
    • Hack Attacks Revealed
    • Wiley, New York
    • Chirillo, J. (2002) Hack Attacks Revealed, Wiley, New York.
    • (2002)
    • Chirillo, J.1
  • 4
    • 0011522539 scopus 로고    scopus 로고
    • Simulating cyber attacks, defenses, and consequences
    • Cohen, F., (1999) "Simulating cyber attacks, defenses, and consequences," [online] all.net/journal/ntb/simulate/ simulate.html.
    • (1999)
    • Cohen, F.1
  • 5
    • 0038103909 scopus 로고    scopus 로고
    • Leading attackers through attack graphs with deceptions
    • 2000
    • Cohen, F., and Koike, D. (2003) "Leading attackers through attack graphs with deceptions," Computers and Security, Vol. 22, no. 5, pp. 402-411, 2003.
    • (2003) Computers and Security , vol.22 , Issue.5 , pp. 402-411
    • Cohen, F.1    Koike, D.2
  • 7
    • 0345015442 scopus 로고    scopus 로고
    • Can computers deliberately deceive? A simulation tool and its application to Turing's imitation game
    • 2003
    • De Rosis, F., Castelfranchi, C., Carofiglio, V., & Grassano, R. (2003) "Can computers deliberately deceive? A simulation tool and its application to Turing's imitation game," Computational Intelligence, Vol. 19, No. 3, 2003, pp. 235-263.
    • (2003) Computational Intelligence , vol.19 , Issue.3 , pp. 235-263
    • De Rosis, F.1    Castelfranchi, C.2    Carofiglio, V.3    Grassano, R.4
  • 8
    • 17644382131 scopus 로고    scopus 로고
    • Victory and Deceit, 2nd edition: Deception and Trickery in War
    • Writers Press Books, San Jose, California
    • Dunnigan, J. F., & Nofi, A. A. (2001) Victory and Deceit, 2nd edition: Deception and Trickery in War, Writers Press Books, San Jose, California.
    • (2001)
    • Dunnigan, J.F.1    Nofi, A.A.2
  • 9
    • 0002635287 scopus 로고
    • The case for case
    • ed. Bach, E. & Harns, R., Holt, Rinehart, & Winston, New York
    • Fillmore, C. (1968) "The case for case," in Universals in Linguistic Theory, ed. Bach, E. & Harns, R., Holt, Rinehart, & Winston, New York.
    • (1968) Universals in Linguistic Theory
    • Fillmore, C.1
  • 10
    • 84903855224 scopus 로고    scopus 로고
    • Persuasive Technology: Using Computers to Change What We Think and Do
    • Morgan Kaufman, San Francisco, CA
    • Fogg, B. (2003) Persuasive Technology: Using Computers to Change What We Think and Do, Morgan Kaufman, San Francisco, CA.
    • (2003)
    • Fogg, B.1
  • 11
    • 0010646470 scopus 로고
    • Tactical deception in air-land warfare
    • June
    • Fowler, C. A., & Nesbit, R. F. (1995) "Tactical deception in air-land warfare," Journal of Electronic Defense, Vol. 18, No. 6 (June), pp. 37-44 & 76-79.
    • (1995) Journal of Electronic Defense , vol.18 , Issue.6
    • Fowler, C.A.1    Nesbit, R.F.2
  • 12
    • 33749586829 scopus 로고    scopus 로고
    • Employing deception in information systems to thwart adversary reconnaissance-phase activities
    • National Defense Research Institute, Rand Corp., PM-1124-NSA, November
    • Gerwehr, S., Weissler, R., Medby, J. J., Anderson, R. H., & Rothenberg, J. (2000) "Employing deception in information systems to thwart adversary reconnaissance-phase activities," Project Memorandum, National Defense Research Institute, Rand Corp., PM-1124-NSA, November.
    • (2000) Project Memorandum
    • Gerwehr, S.1    Weissler, R.2    Medby, J.J.3    Anderson, R.H.4    Rothenberg, J.5
  • 13
    • 0012109964 scopus 로고    scopus 로고
    • Know Your Enemy
    • The Honeynet Project, Second Edition, Addison-Wesley, Boston, Massachusetts
    • The Honeynet Project (2004) Know Your Enemy, Second Edition, Addison-Wesley, Boston, Massachusetts.
    • (2004)
  • 14
    • 3843077323 scopus 로고    scopus 로고
    • Information Warfare: Corporate Attack and Defence in a Digital World
    • Oxford, UK: Butterworth Heinemann
    • Hutchinson, B., & Warren, M. (2001) Information Warfare: Corporate Attack and Defence in a Digital World. Oxford, UK: Butterworth Heinemann.
    • (2001)
    • Hutchinson, B.1    Warren, M.2
  • 15
    • 84896293845 scopus 로고    scopus 로고
    • Experiments with deceptive software responses to bufferbased attacks
    • West Point, New York, June
    • Julian, D., Rowe, N., & Michael, J. B. (2003) "Experiments with deceptive software responses to bufferbased attacks," IEEE-SMC Workshop on Information Assurance, West Point, New York, June, pp. 43-44.
    • (2003) IEEE-SMC Workshop on Information Assurance , pp. 43-44
    • Julian, D.1    Rowe, N.2    Michael, J.B.3
  • 16
    • 10044251518 scopus 로고    scopus 로고
    • Deception in War
    • The Overlook Press, New York
    • Latimer, J. (2001) Deception in War, The Overlook Press, New York.
    • (2001)
    • Latimer, J.1
  • 17
    • 84896282535 scopus 로고    scopus 로고
    • 2005 Annual Security Report
    • MessageLabs
    • MessageLabs (2005) "2005 Annual Security Report," [online], www.messagelabs.com.
    • (2005)
  • 18
    • 9544229100 scopus 로고    scopus 로고
    • The Art of Deception
    • Cyber Age Books, New York
    • Mitnick, K. (2002) The Art of Deception, Cyber Age Books, New York.
    • (2002)
    • Mitnick, K.1
  • 19
    • 2942561852 scopus 로고    scopus 로고
    • Web of Deception: Misinformation on the Internet
    • CyberAge Books, New York
    • Mintz, A. P. (ed.) (2002) Web of Deception: Misinformation on the Internet, CyberAge Books, New York.
    • (2002)
    • Mintz, A.P.1
  • 20
    • 17644382508 scopus 로고    scopus 로고
    • How intrusion detection can improve software decoy applications
    • M.S. thesis, U.S. Naval Postgraduate School, [online]
    • Monteiro, V. (2003) "How intrusion detection can improve software decoy applications," M.S. thesis, U.S. Naval Postgraduate School, [online] www.cs.nps.navy.mil/people/faculty/rowe/oldstudents/monteiro_thesis.htm.
    • (2003)
    • Monteiro, V.1
  • 21
    • 0003742152 scopus 로고
    • The Varnished Truth: Truth Telling and Deceiving in Ordinary Life
    • University of Chicago Press, Chicago
    • Nyberg, D. (1993) The Varnished Truth: Truth Telling and Deceiving in Ordinary Life, University of Chicago Press, Chicago.
    • (1993)
    • Nyberg, D.1
  • 22
    • 0003914957 scopus 로고    scopus 로고
    • Practical Intrusion Detection Handbook
    • Prentice-Hall PTR, Upper Saddle River, NJ
    • Proctor, P. E. (2001) Practical Intrusion Detection Handbook, Prentice-Hall PTR, Upper Saddle River, NJ.
    • (2001)
    • Proctor, P.E.1
  • 23
    • 17644370860 scopus 로고    scopus 로고
    • Counterplanning deceptions to foil cyber-attack plans
    • West Point, NY, June
    • Rowe, N. C. (2003) "Counterplanning deceptions to foil cyber-attack plans," IEEE-SMC Workshop on Information Assurance, West Point, NY, June, pp. 203-211.
    • (2003) IEEE-SMC Workshop on Information Assurance , pp. 203-211
    • Rowe, N.C.1
  • 24
    • 21644439165 scopus 로고    scopus 로고
    • Designing good deceptions in defense of information systems
    • Tucson, AZ, December
    • Rowe, N. (2004) "Designing good deceptions in defense of information systems," Computer Security Applications Conference, Tucson, AZ, December, pp. 418-427.
    • (2004) Computer Security Applications Conference , pp. 418-427
    • Rowe, N.1
  • 25
    • 33749616035 scopus 로고    scopus 로고
    • Measuring the effectiveness of honeypot counter-counterdeception
    • Hawaii International Conference on Systems Sciences, Poipu, HI, January
    • Rowe, N. (2006) "Measuring the effectiveness of honeypot counter-counterdeception," Hawaii International Conference on Systems Sciences, Poipu, HI, January.
    • (2006)
    • Rowe, N.1
  • 26
    • 21644437899 scopus 로고    scopus 로고
    • Two taxonomies of deception for attacks on information systems
    • July
    • Rowe, N., & Rothstein, H. (2004) "Two taxonomies of deception for attacks on information systems," Journal of Information Warfare, 3 (2), July, pp. 27-39.
    • (2004) Journal of Information Warfare , vol.3 , Issue.2 , pp. 27-39
    • Rowe, N.1    Rothstein, H.2
  • 27
    • 0004058336 scopus 로고
    • Excuses: Masquerades in Search of Grace
    • Wiley, New York
    • Snyder, C. R., Higgins, R. L., and Stucky, R. J. (1983) Excuses: Masquerades in Search of Grace, Wiley, New York.
    • (1983)
    • Snyder, C.R.1    Higgins, R.L.2    Stucky, R.J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.