. Military Space News .
CYBER WARS
Defending against cyberattacks by giving attackers 'false hope'
by Staff Writers
Columbia MO (SPX) Jan 29, 2019

illustration only

With almost every online purchase, a person's personal information - name, date of birth and credit card number - is stored electronically often in the "cloud," which is a network of internet servers.

Now, as more people buy from online businesses, researchers at the University of Missouri hope to employ a new strategy in the ongoing struggle to protect digital information in the cloud from targeted cyberattacks. The strategy establishes a new artificial intelligence system to combat digital intrusions.

"We are interested in the targeted attacks where the attacker is trying to exploit data or critical infrastructure resources, such as blocking data access, tampering facts or stealing data," said Prasad Calyam, associate professor of electrical engineering and computer science and the director of Cyber Education and Research Initiative in the MU College of Engineering.

"Attackers are trying to use peoples' compromised resources to infiltrate their data without their knowledge, and these attacks are becoming increasingly significant because attackers are realizing they can make money in a big way like never before."

In this study, the researchers focused on two types of cyberattacks - those seeking customer data and those stealing resources such as bitcoins, a type of digital currency. Their strategy uses artificial intelligence techniques and psychology principles - giving the cyberattacker false hope that the attack is working.

"Our 'defense by pretense' system quarantines the attacker and allows the cloud operators to buy time and build a stronger defense for their systems," Calyam said.

"The quarantine is a decoy that behaves very similar to the real compromised target to keep the attacker assuming that the attack is still succeeding. In a typical cyberattack the more deeply attackers go in the system, the more they have the ability to go many directions. It becomes like a Whack-A-Mole game for those defending the system. Our strategy simply changes the game, but makes the attackers think they are being successful."

Researchers say buying time is important because it allows those directing the cyber resources to devise a more sophisticated defensive strategy to use at a later time when the cyber-attacker returns to make a more vigorous attack knowing that valuable assets are being defended.

Research Report: "Intelligent defense using pretense against targeted attacks in cloud platforms,"


Related Links
University of Missouri-Columbia
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
China blasts US 'bullying' with Huawei CFO extradition bid
Beijing (AFP) Jan 23, 2019
China on Wednesday accused the United States of "bullying behaviour" after US authorities confirmed plans to seek the extradition of a top Chinese telecom executive detained in Canada. The United States faces a January 30 deadline to file an extradition request for Huawei chief financial officer Meng Wanzhou, whose arrest last month sparked diplomatic tensions. "We will continue to pursue the extradition of defendant Ms Meng Wanzhou, and will meet all deadlines set by the US/Canada Extradition T ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Swedish army orders Rheinmetall trucks for Patriot missile systems

Israel Successfully Tests Arrow 3 Air Defence System

Moscow urges US to abandon plans to resurrect 'Star Wars'

Israel, US test ballistic missile interceptor

CYBER WARS
MBDA's new MMP missile system successfully deployed in Mali

Raytheon taps Phoenix Products for Naval Strike Missile containers

US Navy and Air Force awards Lockheed Martin Second Production Lot for Long Range Anti-Ship Missiles

Raytheon contracted for additional upgrades to AMRAAMs

CYBER WARS
Taiwan unveils new drone as China tensions mount

Ecuador eradicates Galapagos rats using drones

Staff fraud may cost China's DJI drone maker $150 million

Drones shown to make traffic crash site assessments safer, faster and more accurate

CYBER WARS
Reflectarray Antenna offers high performance in small package: DARPA

BAE signs $79.8M contract with Navy for Pacific comms support

Russia to Complete Military Satellite Constellation Blagovest in April

Honeywell and GetSAT win multi-million dollar deal with US Government

CYBER WARS
BAE awarded $474M for support of Army's M109 Family of Vehicles

AECOM gets $9M Army contract for assault breacher supplies

Leidos awarded $9.7M contract for anti-IED surveillance support

General Dynamics to upgrade 174 more Abrams tanks

CYBER WARS
Report: Pentagon allowed $28B in available funds to expire

Croatia threatens to axe plans to buy F-16 jets from Israel

Trump claims he 'essentially fired' Mattis

Canada mulls canceling Saudi arms deal over Yemen, Kashoggi murder

CYBER WARS
NATO says no progress in Russia talks on arms treaty

U.S. destroyer Donald Cook arrives in Black Sea region for NATO drills

Franco-German treaty a step toward 'European army': Merkel

Army preps troop, equipment rotation in Europe for Atlantic Resolve

CYBER WARS
New applications for encapsulated nanoparticles with promising properties

Chemical synthesis of nanotubes

Carrying and releasing nanoscale cargo with 'nanowrappers'

Illuminating nanoparticle growth with X-rays









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.