SlideShare a Scribd company logo
Using Deception to Enhance Security: A
Taxonomy, Model and Novel Uses
Mohammed H. Almeshekah
Thesis Defense
Special Thanks!
• To my advisors:
• Prof. Eugene Spafford
• Prof. Mike Atallah
• To my committee members:
• Prof. Sam Wagstaff
• Prof. Matt Bishop
Introduction
A Holistic Overview of Security
Defenses
Computer System
Defenses
Denial and Isolation
(1) Prevent unauthorized
access.
(2) Hide the existence
and/or the nature of
systems and/or data.
Degradation and
Obfuscation
(1) 	Slow down the
attackers.
(2) 	Prevent and reduce the
recovery.
(3) Obfuscate the value/
nature of systems and/or
data.
(4) 	Create noise around
valuable data.
Deception and Negative
Information
(1) Lead the attackers
astray.
(2) 	Add decoys.
(3) 	Add doubt to the
data obtained by the
adversary.
(4) 	Increase the risk of
attacking computer
systems.
Attribution and Counter
Operation
(1) 	Attributing adversaries.
(2) 	Cause damage to
attackers.
(3) Increase overall risk in
attacking our systems.
Computer System
Defenses
Denial and Isolation
(1) Prevent unauthorized
access.
(2) Hide the existence
and/or the nature of
systems and/or data.
Degradation and
Obfuscation
(1) 	Slow down the
attackers.
(2) 	Prevent and reduce the
recovery.
(3) Obfuscate the value/
nature of systems and/or
data.
(4) 	Create noise around
valuable data.
Deception and Negative
Information
(1) Lead the attackers
astray.
(2) 	Add decoys.
(3) 	Add doubt to the
data obtained by the
adversary.
(4) 	Increase the risk of
attacking computer
systems.
Attribution and Counter
Operation
(1) 	Attributing adversaries.
(2) 	Cause damage to
attackers.
(3) Increase overall risk in
attacking our systems.
Status Quo
• Breaches:
• 84% of these attacks took hours or less to infiltrate.
• 66% of breaches took months or years to discover.
• Defenses:
• Only 5% of these breaches were detected using
traditional tools.
Using Deception as a
Defensive Mechanism
Traditional Security
Defenses
Narrowing down the
attack path!
Whack

Your

Attacker
Security Tools
Computer
System
Traditional Security
Defenses
Narrowing down the
attack path!
Whack

Your

Attacker
Security Tools
Computer
System
Deception-Based Defenses
• Traditional security (negative clues) and deception
(positive clues) work in tandem.
• Humans are not good at detecting deception:
• Detecting deception by college students → 57%
• Detecting deception by law enforcement → 54%
Uniques Advantages of Using Deception
Uniques Advantages of Using Deception
Uniques Advantages of Using Deception
Uniques Advantages of Using Deception
Uniques Advantages of Using Deception
Previous Uses of Deception
• Used as ad-hoc attempt:
• Deception has been mainly used as “trapping” or
“deterrence” tools.
• Trojan Horses, Phishing, XSS, XSRF and others have long
been effective.
• Deception is Effectively Used in Many Areas of Computing.
Dissertation Overview
Framework for Using
Deception in Security
Defenses
A Framework
Deception Framework (3) Exploit Attacker’s Biases
What are the plausible
responses to the attack
and which ones should
you use?
Deception Framework (4) Apply Deception
Make your system lie
Deception Framework (4) Apply Deception
Deception Framework (8) Monitoring and Dynamic Adjusting
Continuous monitoring
and dynamic adjustment
based on the attacker’s
response
Deceptive Covert
Channel
A Password Dangerous
Trip
MitB MitM
Information Asymmetry Context-less Authentication
User wants to
access
Banks want me to
access.
Information Asymmetry Contextual Authentication
Public Network?
Email link?
….
Dynamic Decision
context
Goals of Using Such Channel
• Limit passwords exposure.
• Communicate the user’s authentication context.
• Incorporate covert messages in the protocol that are
totally oblivious to any part observing.
A Deceptive Covert Communication
• We will use an accumulation function A() that can be
realized using modular exponentiation.
• A(x1, x2) = A(x2, x1).
• Computing A(A(x1), x2) doesn’t require the knowledge
of x1, and = A(x1, x2).
• Current systems store h = H(passwd || salt).
A Deceptive Covert
Communication
Check whether username exists?
if usernameExists():
R = randomNonce()
key = A(h, R)
x = HMACkey(A(R), s, id)
Send QR(A(R), x, s, id)
id = Serverid
A Deceptive Covert
Communication
Check the integrity of QR
h = Hash(passwd || salt)
key = A(A(R), h)
x’ = HMACkey(A(R), s, id)
if x == x’ -> route (b)
else -> route (a)
A Deceptive Covert
Communication
Covert message
code = A(A(R), h, msgs)
A Deceptive Covert
Communication
Verifying the code
code’ = A(A(R), h,
possible msgs)
check code =? code’
Comparison
Ersatzpassword
A Password Lifecycle
Insider Threat/
Compromise
Passwords Files are Attractive Target
• Evernote reported the leakage of the hashed passwords
for more than 50 million users
• Other attacks against Yahoo, RockYou, LinkedIn and
eHarmony has been reported.
• Passwords cracking is often a precursor to more
significant attacks.
Ersatzpasswords
Goals
• Eliminate the possibility
of an offline passwords
cracking.

• Detect the leakage of
users’ passwords.

• Proactively detect
accounts impersonation
attempts.
Technical Specification — One-Time Initialization
• Instantaneously store all passwords in a machine
dependent format.
[ ui , αi , si ]

↓

HDF(αi)

↓

βi = H(HDF(αi) || si)

↓

[ ui , βi , si ]
αi = H(pi || si)
Technical Specification — Injecting
Ersatzpasswords
• When the user is logging-in:
ui , pi

↓

pi*

↓

si’ = HDF(pi || ui) ⊕ pi*

↓

βi’ = H[ pi* || si’],

↓

[ ui , βi’, si’]
[Choose an erstazpassword]
[Compute a new salt]
, pi* = HDF(pi || ui) ⊕ si’
Technical Specification — Login
• The user enters her username (ui) and password (pi).
• The systems checks:
• If H[ (HDF(pi || ui) ⊕ si’) || si’] equals βi’ → correct login.
• If H(pi || si’) equals βi’ → ersatzpassword login.
• else → incorrect username/password.
Three Main Properties
• Checking a password requires access to HDF

→ thwarting offline cracking.
• Cracking returns an ersatzpassword for every account

→ triggering an alarm at the server when used.
• Maintain the same format of the password file

→ deceiving the attacker.
Ersatzpasswords Properties
• Plausibility
• Non-Deducibility
• Typo-Resilience
• Crackable
• Policy Adherence
Implementation
• We used YubiHSM.
• HDF(p) := HMAC-SHA1k(p)
• Implemented as a modified pam_unix in an OpenBSD
OS.
Performance Analysis
Normal OpenBSD Modified OpenBSD
Password update
Authentication
Deceptiver
Web Applications
• Verizon DBIR identified web application attacks as the
most common incident in 2013 accounting for 35% of all
incidents.
• Gartner states that more than 70% of threats are at the
web application layer
Deceptiver
Deceptiver vs. Honeypots
• Instantaneous reflecting the current production state.
• Honeypots are yet another set of systems that need to
be administered and updated.
• Honeypots need to keep copies of different individual
resources where deceit is injected.
Deceptiver
Responses
1. Traps

•Administrative resources
(e.g. .htaccess).

•Isolated resource.

•Meta/Hidden data.

•Known Vulnerabilities.

2. Active deceptive responses

•Performance.

•Public data.

•Software and services
Implementation
Performance Analysis
Performance Analysis
— 2
• Further investigating
performance showed
that 9 lines of codes
take %99.2 of
execution time.

• All of those are
querying the mySQL
database.
Future Work
The role of
biases
This
Dissertation
Modeling
the use of
deception
The creation
of deceit
Deception
Metrics
Advanced
tools
Economical
and ethical
issues
Future Work
The role of
biases
This
Dissertation
Modeling
the use of
deception
The creation
of deceit
Deception
Metrics
Advanced
tools
Economical
and ethical
issues
• The role of Deception.
• A framework to plan and
integrate deception.
• Three practical tools.
Future Work
The role of
biases
This
Dissertation
Modeling
the use of
deception
The creation
of deceit
Deception
Metrics
Advanced
tools
Economical
and ethical
issues
• In defending computer systems.
• In protecting users.
• Further investigating cultural and
organization biases.
Future Work
The role of
biases
This
Dissertation
Modeling
the use of
deception
The creation
of deceit
Deception
Metrics
Advanced
tools
Economical
and ethical
issues
• Using game theoretical
models (e.g. hypergames).
• Where to apply deception
within the kill-chain.
Future Work
The role of
biases
This
Dissertation
Modeling
the use of
deception
The creation
of deceit
Deception
Metrics
Advanced
tools
Economical
and ethical
issues
• Cost/benefit analysis.
• Externality effects.
• Lying to regular users.
Future Work
The role of
biases
This
Dissertation
Modeling
the use of
deception
The creation
of deceit
Deception
Metrics
Advanced
tools
Economical
and ethical
issues
• Measuring plausibility,
deductibility, confusion and
other characteristics.
Future Work
The role of
biases
This
Dissertation
Modeling
the use of
deception
The
creation of
deceit
Deception
Metrics
Advanced
tools
Economical
and ethical
issues
• How to create believable
fake information?
Future Work
The role of
biases
This
Dissertation
Modeling
the use of
deception
The creation
of deceit
Deception
Metrics
Advanced
tools
Economical
and ethical
issues
• Deceptive file system.
• Deceptive patches.
• Deceptive system calls.
Publications
• M. Almeshekah, C. Gutierrez, M. Atallah and E. Spafford, “ErsatzPasswords – Ending Passwords
Cracking” (under review).
• M. Almeshekah, M. Atallah and E. Spafford, “Enhancing Passwords Security using Deceptive Covert
Communication,” International Conference on ICT Systems Security and Privacy Protection, IFIP SEC’15,
May 26-28, 2015, Hamburg, Germany.
• M. Almeshekah and E. Spafford, “Using Deceptive Information in Computer Security Defenses,” International
Journal of Cyber Warfare and Terrorism (IJCWT), 4 (3), 46-58, July-September 2014, IGI Global.
• M. Almeshekah and E. Spafford, “Planning and Integrating Deception into Computer Security Defenses,”
New Security Paradigms Workshop (NSPW’14), 15-18 September 2014, Victoria, BC, Canada.
• M. Almeshekah and E. Spafford, “The Case of Using Negative (Deceiving) Information in Data Protection,” in
Proceedings of the 9th International Conference on Cyber Warfare and Security ICCWS-2014, ISSN:
2048-9870, Academic Conferences and Publishing International Limited, March 2014.
• M. Almeshekah, M. Atallah, and E. Spafford, “Back channels can be useful! – layering authentication
channels to provide covert communication,” SPW’13, in Security Protocols XXI (B. Christianson, J. Malcolm,
F. Stajano, and J. Anderson, eds.), vol. 8263 of Lecture Notes in Computer Science, Springer Berlin
Heidelberg, 2013.
Thanks! Questions?

More Related Content

PDF
Truth and Consequences
PDF
Planning and Integrating Deception into Computer Security Defenses
PPTX
Red Team Operations: Attack and Think Like a Criminal
PDF
Self-Learning Systems for Cyber Security
PDF
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
PPTX
Cyber Threat Hunting Training (CCTHP)
DOCX
SEC 572 Entire Course NEW
PPTX
Threat hunting and achieving security maturity
Truth and Consequences
Planning and Integrating Deception into Computer Security Defenses
Red Team Operations: Attack and Think Like a Criminal
Self-Learning Systems for Cyber Security
Introduction of Threat Analysis Methods(FFRI Monthly Research 2016.9)
Cyber Threat Hunting Training (CCTHP)
SEC 572 Entire Course NEW
Threat hunting and achieving security maturity

What's hot (20)

PPTX
Abstract Tools for Effective Threat Hunting
PPTX
Strata 2015 Presentation -- Detecting Lateral Movement
PDF
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
PPTX
Using IOCs to Design and Control Threat Activities During a Red Team Engagement
PDF
Enabling effective hunt teaming and incident response
PPTX
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
PPTX
Building a Successful Threat Hunting Program
PPTX
Art into Science 2017 - Investigation Theory: A Cognitive Approach
PDF
Threat hunting 101 by Sandeep Singh
PPTX
Cyber Threat Hunting: Identify and Hunt Down Intruders
PPTX
Threat hunting - Every day is hunting season
PPTX
SOC2016 - The Investigation Labyrinth
PDF
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
PDF
MITRE ATTACKcon Power Hour - October
PPTX
What is Threat Hunting? - Panda Security
PPT
Introduction to Malware - Part 1
PDF
Threat Hunting Report
PDF
Transforming Adversary Emulation Into a Data Analysis Question
PDF
Resistance Isn't Futile: A Practical Approach to Threat Modeling
PPTX
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Abstract Tools for Effective Threat Hunting
Strata 2015 Presentation -- Detecting Lateral Movement
STRIDE Variants and Security Requirements-based Threat Analysis (FFRI Monthly...
Using IOCs to Design and Control Threat Activities During a Red Team Engagement
Enabling effective hunt teaming and incident response
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
Building a Successful Threat Hunting Program
Art into Science 2017 - Investigation Theory: A Cognitive Approach
Threat hunting 101 by Sandeep Singh
Cyber Threat Hunting: Identify and Hunt Down Intruders
Threat hunting - Every day is hunting season
SOC2016 - The Investigation Labyrinth
Luncheon 2016-07-16 - Topic 2 - Advanced Threat Hunting by Justin Falck
MITRE ATTACKcon Power Hour - October
What is Threat Hunting? - Panda Security
Introduction to Malware - Part 1
Threat Hunting Report
Transforming Adversary Emulation Into a Data Analysis Question
Resistance Isn't Futile: A Practical Approach to Threat Modeling
Most Ransomware Isn’t As Complex As You Might Think – Black Hat 2015
Ad

Viewers also liked (20)

DOCX
SIU Unofficial Transcript
PDF
نظام إدارة مؤسسات تعليم القران
PDF
Rfid tech for library | تحديد الهوية بموجات الراديو
PPSX
Information security presentation
PPTX
محاولة تأريخ لعلم الأجرام عبر الأنترنت
PPTX
حجية الدليل الرقمي وموقع المشروع اليبي
PPT
Information Security Lesson 6 - Web Security - Eric Vanderburg
PPTX
PDF
نظام إدارة المؤسسات التدربية التعليمية
PPSX
قضايا معرفية في الأمن السبراني
PPTX
امن الشبكات المخاطر والحلول
PPT
Managing System Security
PPTX
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
PDF
افاق المعرفة- نظام ادارة المكتبات
PDF
مسودة مشروع قانون المعاملات الالكترونية الليبي
PPTX
إختبارات في أمن المعلومات It security
PPTX
شبكات و أمن المعلومات 1
PPTX
أساسيات أمن المعلومات
PPTX
information security
PPTX
Security of the database
SIU Unofficial Transcript
نظام إدارة مؤسسات تعليم القران
Rfid tech for library | تحديد الهوية بموجات الراديو
Information security presentation
محاولة تأريخ لعلم الأجرام عبر الأنترنت
حجية الدليل الرقمي وموقع المشروع اليبي
Information Security Lesson 6 - Web Security - Eric Vanderburg
نظام إدارة المؤسسات التدربية التعليمية
قضايا معرفية في الأمن السبراني
امن الشبكات المخاطر والحلول
Managing System Security
العرض المرئي عن الشركة عبر الخليج لتقنية المعلومات
افاق المعرفة- نظام ادارة المكتبات
مسودة مشروع قانون المعاملات الالكترونية الليبي
إختبارات في أمن المعلومات It security
شبكات و أمن المعلومات 1
أساسيات أمن المعلومات
information security
Security of the database
Ad

Similar to Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- Thesis Defense (20)

PDF
File-Based Deception Technology for Impeding Malicious Users
PDF
Honeypots, Deception, and Frankenstein
PPTX
Security in network computing
PPTX
Security and protection
PPTX
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
PPTX
Security in Computer System
PDF
Security in computer systems fundamentals
PDF
Cs8792 cns - unit v
PPTX
Te chnical presentation networkexploits and security
PDF
PPTX
Raising the dead to save the living
PDF
Health Information Privacy and Security
PDF
Virtualisasi Hacking
PPT
Rainer+3e Student Pp Ts Ch03
PDF
ch15.pdf
PPT
What do you do with a careless user (legacy)
PDF
A Journey Into Deception Based Security
PPTX
An An Exploration Into the Cyber Security
PDF
Drooger, jack cyber security
PPT
2.4.1 - Intro to Cyber Security for students.ppt
File-Based Deception Technology for Impeding Malicious Users
Honeypots, Deception, and Frankenstein
Security in network computing
Security and protection
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Security in Computer System
Security in computer systems fundamentals
Cs8792 cns - unit v
Te chnical presentation networkexploits and security
Raising the dead to save the living
Health Information Privacy and Security
Virtualisasi Hacking
Rainer+3e Student Pp Ts Ch03
ch15.pdf
What do you do with a careless user (legacy)
A Journey Into Deception Based Security
An An Exploration Into the Cyber Security
Drooger, jack cyber security
2.4.1 - Intro to Cyber Security for students.ppt

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
KodekX | Application Modernization Development
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
cuic standard and advanced reporting.pdf
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Spectroscopy.pptx food analysis technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Encapsulation theory and applications.pdf
Understanding_Digital_Forensics_Presentation.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KodekX | Application Modernization Development
Programs and apps: productivity, graphics, security and other tools
Building Integrated photovoltaic BIPV_UPV.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
cuic standard and advanced reporting.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectroscopy.pptx food analysis technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Encapsulation theory and applications.pdf

Using Deception to Enhance Security: A Taxonomy, Model, and Novel Uses -- Thesis Defense

  • 1. Using Deception to Enhance Security: A Taxonomy, Model and Novel Uses Mohammed H. Almeshekah Thesis Defense
  • 2. Special Thanks! • To my advisors: • Prof. Eugene Spafford • Prof. Mike Atallah • To my committee members: • Prof. Sam Wagstaff • Prof. Matt Bishop
  • 3. Introduction A Holistic Overview of Security Defenses
  • 4. Computer System Defenses Denial and Isolation (1) Prevent unauthorized access. (2) Hide the existence and/or the nature of systems and/or data. Degradation and Obfuscation (1) Slow down the attackers. (2) Prevent and reduce the recovery. (3) Obfuscate the value/ nature of systems and/or data. (4) Create noise around valuable data. Deception and Negative Information (1) Lead the attackers astray. (2) Add decoys. (3) Add doubt to the data obtained by the adversary. (4) Increase the risk of attacking computer systems. Attribution and Counter Operation (1) Attributing adversaries. (2) Cause damage to attackers. (3) Increase overall risk in attacking our systems.
  • 5. Computer System Defenses Denial and Isolation (1) Prevent unauthorized access. (2) Hide the existence and/or the nature of systems and/or data. Degradation and Obfuscation (1) Slow down the attackers. (2) Prevent and reduce the recovery. (3) Obfuscate the value/ nature of systems and/or data. (4) Create noise around valuable data. Deception and Negative Information (1) Lead the attackers astray. (2) Add decoys. (3) Add doubt to the data obtained by the adversary. (4) Increase the risk of attacking computer systems. Attribution and Counter Operation (1) Attributing adversaries. (2) Cause damage to attackers. (3) Increase overall risk in attacking our systems.
  • 6. Status Quo • Breaches: • 84% of these attacks took hours or less to infiltrate. • 66% of breaches took months or years to discover. • Defenses: • Only 5% of these breaches were detected using traditional tools.
  • 7. Using Deception as a Defensive Mechanism
  • 8. Traditional Security Defenses Narrowing down the attack path! Whack
 Your
 Attacker Security Tools Computer System
  • 9. Traditional Security Defenses Narrowing down the attack path! Whack
 Your
 Attacker Security Tools Computer System
  • 10. Deception-Based Defenses • Traditional security (negative clues) and deception (positive clues) work in tandem. • Humans are not good at detecting deception: • Detecting deception by college students → 57% • Detecting deception by law enforcement → 54%
  • 11. Uniques Advantages of Using Deception
  • 12. Uniques Advantages of Using Deception
  • 13. Uniques Advantages of Using Deception
  • 14. Uniques Advantages of Using Deception
  • 15. Uniques Advantages of Using Deception
  • 16. Previous Uses of Deception • Used as ad-hoc attempt: • Deception has been mainly used as “trapping” or “deterrence” tools. • Trojan Horses, Phishing, XSS, XSRF and others have long been effective. • Deception is Effectively Used in Many Areas of Computing.
  • 18. Framework for Using Deception in Security Defenses
  • 20. Deception Framework (3) Exploit Attacker’s Biases What are the plausible responses to the attack and which ones should you use?
  • 21. Deception Framework (4) Apply Deception Make your system lie
  • 22. Deception Framework (4) Apply Deception
  • 23. Deception Framework (8) Monitoring and Dynamic Adjusting Continuous monitoring and dynamic adjustment based on the attacker’s response
  • 26. Information Asymmetry Context-less Authentication User wants to access Banks want me to access.
  • 27. Information Asymmetry Contextual Authentication Public Network? Email link? …. Dynamic Decision context
  • 28. Goals of Using Such Channel • Limit passwords exposure. • Communicate the user’s authentication context. • Incorporate covert messages in the protocol that are totally oblivious to any part observing.
  • 29. A Deceptive Covert Communication • We will use an accumulation function A() that can be realized using modular exponentiation. • A(x1, x2) = A(x2, x1). • Computing A(A(x1), x2) doesn’t require the knowledge of x1, and = A(x1, x2). • Current systems store h = H(passwd || salt).
  • 30. A Deceptive Covert Communication Check whether username exists? if usernameExists(): R = randomNonce() key = A(h, R) x = HMACkey(A(R), s, id) Send QR(A(R), x, s, id) id = Serverid
  • 31. A Deceptive Covert Communication Check the integrity of QR h = Hash(passwd || salt) key = A(A(R), h) x’ = HMACkey(A(R), s, id) if x == x’ -> route (b) else -> route (a)
  • 32. A Deceptive Covert Communication Covert message code = A(A(R), h, msgs)
  • 33. A Deceptive Covert Communication Verifying the code code’ = A(A(R), h, possible msgs) check code =? code’
  • 36. A Password Lifecycle Insider Threat/ Compromise
  • 37. Passwords Files are Attractive Target • Evernote reported the leakage of the hashed passwords for more than 50 million users • Other attacks against Yahoo, RockYou, LinkedIn and eHarmony has been reported. • Passwords cracking is often a precursor to more significant attacks.
  • 38. Ersatzpasswords Goals • Eliminate the possibility of an offline passwords cracking. • Detect the leakage of users’ passwords. • Proactively detect accounts impersonation attempts.
  • 39. Technical Specification — One-Time Initialization • Instantaneously store all passwords in a machine dependent format. [ ui , αi , si ]
 ↓
 HDF(αi)
 ↓
 βi = H(HDF(αi) || si)
 ↓
 [ ui , βi , si ] αi = H(pi || si)
  • 40. Technical Specification — Injecting Ersatzpasswords • When the user is logging-in: ui , pi
 ↓
 pi*
 ↓
 si’ = HDF(pi || ui) ⊕ pi*
 ↓
 βi’ = H[ pi* || si’],
 ↓
 [ ui , βi’, si’] [Choose an erstazpassword] [Compute a new salt] , pi* = HDF(pi || ui) ⊕ si’
  • 41. Technical Specification — Login • The user enters her username (ui) and password (pi). • The systems checks: • If H[ (HDF(pi || ui) ⊕ si’) || si’] equals βi’ → correct login. • If H(pi || si’) equals βi’ → ersatzpassword login. • else → incorrect username/password.
  • 42. Three Main Properties • Checking a password requires access to HDF
 → thwarting offline cracking. • Cracking returns an ersatzpassword for every account
 → triggering an alarm at the server when used. • Maintain the same format of the password file
 → deceiving the attacker.
  • 43. Ersatzpasswords Properties • Plausibility • Non-Deducibility • Typo-Resilience • Crackable • Policy Adherence
  • 44. Implementation • We used YubiHSM. • HDF(p) := HMAC-SHA1k(p) • Implemented as a modified pam_unix in an OpenBSD OS.
  • 45. Performance Analysis Normal OpenBSD Modified OpenBSD Password update Authentication
  • 47. Web Applications • Verizon DBIR identified web application attacks as the most common incident in 2013 accounting for 35% of all incidents. • Gartner states that more than 70% of threats are at the web application layer
  • 49. Deceptiver vs. Honeypots • Instantaneous reflecting the current production state. • Honeypots are yet another set of systems that need to be administered and updated. • Honeypots need to keep copies of different individual resources where deceit is injected.
  • 50. Deceptiver Responses 1. Traps •Administrative resources (e.g. .htaccess). •Isolated resource. •Meta/Hidden data. •Known Vulnerabilities. 2. Active deceptive responses •Performance. •Public data. •Software and services
  • 53. Performance Analysis — 2 • Further investigating performance showed that 9 lines of codes take %99.2 of execution time. • All of those are querying the mySQL database.
  • 54. Future Work The role of biases This Dissertation Modeling the use of deception The creation of deceit Deception Metrics Advanced tools Economical and ethical issues
  • 55. Future Work The role of biases This Dissertation Modeling the use of deception The creation of deceit Deception Metrics Advanced tools Economical and ethical issues • The role of Deception. • A framework to plan and integrate deception. • Three practical tools.
  • 56. Future Work The role of biases This Dissertation Modeling the use of deception The creation of deceit Deception Metrics Advanced tools Economical and ethical issues • In defending computer systems. • In protecting users. • Further investigating cultural and organization biases.
  • 57. Future Work The role of biases This Dissertation Modeling the use of deception The creation of deceit Deception Metrics Advanced tools Economical and ethical issues • Using game theoretical models (e.g. hypergames). • Where to apply deception within the kill-chain.
  • 58. Future Work The role of biases This Dissertation Modeling the use of deception The creation of deceit Deception Metrics Advanced tools Economical and ethical issues • Cost/benefit analysis. • Externality effects. • Lying to regular users.
  • 59. Future Work The role of biases This Dissertation Modeling the use of deception The creation of deceit Deception Metrics Advanced tools Economical and ethical issues • Measuring plausibility, deductibility, confusion and other characteristics.
  • 60. Future Work The role of biases This Dissertation Modeling the use of deception The creation of deceit Deception Metrics Advanced tools Economical and ethical issues • How to create believable fake information?
  • 61. Future Work The role of biases This Dissertation Modeling the use of deception The creation of deceit Deception Metrics Advanced tools Economical and ethical issues • Deceptive file system. • Deceptive patches. • Deceptive system calls.
  • 62. Publications • M. Almeshekah, C. Gutierrez, M. Atallah and E. Spafford, “ErsatzPasswords – Ending Passwords Cracking” (under review). • M. Almeshekah, M. Atallah and E. Spafford, “Enhancing Passwords Security using Deceptive Covert Communication,” International Conference on ICT Systems Security and Privacy Protection, IFIP SEC’15, May 26-28, 2015, Hamburg, Germany. • M. Almeshekah and E. Spafford, “Using Deceptive Information in Computer Security Defenses,” International Journal of Cyber Warfare and Terrorism (IJCWT), 4 (3), 46-58, July-September 2014, IGI Global. • M. Almeshekah and E. Spafford, “Planning and Integrating Deception into Computer Security Defenses,” New Security Paradigms Workshop (NSPW’14), 15-18 September 2014, Victoria, BC, Canada. • M. Almeshekah and E. Spafford, “The Case of Using Negative (Deceiving) Information in Data Protection,” in Proceedings of the 9th International Conference on Cyber Warfare and Security ICCWS-2014, ISSN: 2048-9870, Academic Conferences and Publishing International Limited, March 2014. • M. Almeshekah, M. Atallah, and E. Spafford, “Back channels can be useful! – layering authentication channels to provide covert communication,” SPW’13, in Security Protocols XXI (B. Christianson, J. Malcolm, F. Stajano, and J. Anderson, eds.), vol. 8263 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, 2013.