Planting a Poison SEAD: Using Social Engineering Active Defense (SEAD) to Counter Cybercriminals

Interacción Pub Date : 2022-02-12 DOI:10.31219/osf.io/6xj93
Matthew Canham, Juliet Ruby Tuthill
{"title":"Planting a Poison SEAD: Using Social Engineering Active Defense (SEAD) to Counter Cybercriminals","authors":"Matthew Canham, Juliet Ruby Tuthill","doi":"10.31219/osf.io/6xj93","DOIUrl":null,"url":null,"abstract":"By nearly every metric, the status quo of information security is not working. The interaction matrix of attacker-defender dynamics strongly favors the attacker who only needs to be lucky once. We argue that employing social engineering active defense (SEAD) will be more effective to countering malicious actors than maintaining the traditional passive defensive strategy. The Offensive Countermeasures (OCM) approach to defense advocates for three categories of countermeasures: annoyance, attribution, and attack. Annoyance aims to waste the attacker’s time and resources with the objective of not only deterrence but also to increase the probability of detection and attribution. Attribution attempts to identify who is launching the attack. Gathering as much threat intelligence on who the attacker is, provides the best possible defense against future attacks. Finally, attack involves running code on the attacker’s system for the purpose of deterrence and attribution. In this work, we advocate for utilizing similar approaches to deny, degrade, and de-anonymize malicious actors by using social engineering tools, tactics, and procedures against the attackers. Rather than fearing the threats posed by synthetic media, cyber defenders should embrace these capabilities by turning these against criminals. Future research should explore ways to implement synthetic media and automated SEAD methods to degrade the capabilities of online malicious actors.","PeriodicalId":129626,"journal":{"name":"Interacción","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Interacción","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31219/osf.io/6xj93","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

By nearly every metric, the status quo of information security is not working. The interaction matrix of attacker-defender dynamics strongly favors the attacker who only needs to be lucky once. We argue that employing social engineering active defense (SEAD) will be more effective to countering malicious actors than maintaining the traditional passive defensive strategy. The Offensive Countermeasures (OCM) approach to defense advocates for three categories of countermeasures: annoyance, attribution, and attack. Annoyance aims to waste the attacker’s time and resources with the objective of not only deterrence but also to increase the probability of detection and attribution. Attribution attempts to identify who is launching the attack. Gathering as much threat intelligence on who the attacker is, provides the best possible defense against future attacks. Finally, attack involves running code on the attacker’s system for the purpose of deterrence and attribution. In this work, we advocate for utilizing similar approaches to deny, degrade, and de-anonymize malicious actors by using social engineering tools, tactics, and procedures against the attackers. Rather than fearing the threats posed by synthetic media, cyber defenders should embrace these capabilities by turning these against criminals. Future research should explore ways to implement synthetic media and automated SEAD methods to degrade the capabilities of online malicious actors.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
植入有毒的SEAD:使用社会工程主动防御(SEAD)来对抗网络罪犯
从几乎每一个标准来看,信息安全的现状都是行不通的。攻击者-防御者动态交互矩阵强烈倾向于只需要幸运一次的攻击者。我们认为,采用社会工程主动防御(SEAD)将比保持传统的被动防御策略更有效地对抗恶意行为者。进攻性对策(OCM)防御方法提倡三种对策:烦恼、归因和攻击。烦恼的目的是浪费攻击者的时间和资源,目的不仅是威慑,而且是增加发现和归因的概率。归因试图确定是谁发起了攻击。尽可能多地收集攻击者的威胁情报,为未来的攻击提供最好的防御。最后,攻击涉及在攻击者的系统上运行代码,以达到威慑和归因的目的。在这项工作中,我们提倡利用类似的方法,通过使用社会工程工具、策略和程序来拒绝、降低和去匿名化恶意行为者。网络防御者不应该担心合成媒体带来的威胁,而应该利用这些能力来对付罪犯。未来的研究应该探索实现合成媒体和自动化SEAD方法的方法,以降低在线恶意行为者的能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Thousand Faces of Explainable AI Along the Machine Learning Life Cycle: Industrial Reality and Current State of Research Tell Me, What Are You Most Afraid Of? Exploring the Effects of Agent Representation on Information Disclosure in Human-Chatbot Interaction Modular 3D Interface Design for Accessible VR Applications A new perspective on the prediction of the innovation performance: A data driven methodology to identify innovation indicators through a comparative study of Boston's neighborhoods Two Heads are Better than One: A Bio-inspired Method for Improving Classification on EEG-ET Data
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1