Skip to content

Latest commit

 

History

History
33 lines (25 loc) · 1.49 KB

File metadata and controls

33 lines (25 loc) · 1.49 KB

DS0001 - Sample Deception Story

Deception story: The attacker overcomes security controls and reaches log files

Associated deception techniques: T1-Fake Database, T4-Log Manipulation

Associated MITRE ATT&CK techniques: T1139

Deception story in Given-When-Then (GWT) format

Given the system has some vulnerability
And an attacker gains access to the file system
And the attacker reaches the log files location
And the attacker touches the log file
And the attacker inspects the records
And the attacker finds URL/User of database
When the attacker tries to gain access to the
database using bogus user accounts
Then an alert is sent to management system

Deception strategy

Strategy Description
Goal 1) Identify attackers trying to gain access to the server, 2) Divert attackers with bogus data pointing to multiple directions
Attackers’ biases Availability heuristic (Overestimate the importance of sensitive data inside the log file)
Monitoring channels Depends on the implementation; Authentication function, Honeypot logs
Risks and countermeasures Attacker identifies data as fake

Reference

  • C. De Faveri and A. Moreira, "Designing Adaptive Deception Strategies," 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Vienna, 2016, pp. 77-84.