Deception and Consistency
Matt Bishop, Vicentiu Neagoe
The use of deception is one of the many defensive techniques being explored today. In the past, defenders of systems have used deception haphazardly, but now researchers are developing systematic methods of deception. The cornerstone of these methods is consistency: projecting a “false reality”, or “fiction”, that the attacker is to accept as reality. We challenge the necessity of this cornerstone.
This talk presents questions on the need for consistency in deception. We then discuss how to add deceptive mechanisms to the host, and examine two common functions (deleting a file and obtaining the name of the current working directory) to demonstrate the effects of inconsistency in deception, and ways to add it.