A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks during Cyber-Attacks

The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital revolution we are currently experiencing. This irrefutable reality is a major reason why cybersecurity defences continue to be a pressing and ti...

Full description

Bibliographic Details
Published in:IEEE Access
Main Author: Taofeek O.T.; Alawida M.; Alabdulatif A.; Omolara A.E.; Abiodun O.I.
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2022
Online Access:https://www.scopus.com/inward/record.uri?eid=2-s2.0-85128314923&doi=10.1109%2fACCESS.2022.3166628&partnerID=40&md5=a90b91845365aabc0a962263342cd2dd
id 2-s2.0-85128314923
spelling 2-s2.0-85128314923
Taofeek O.T.; Alawida M.; Alabdulatif A.; Omolara A.E.; Abiodun O.I.
A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks during Cyber-Attacks
2022
IEEE Access
10

10.1109/ACCESS.2022.3166628
https://www.scopus.com/inward/record.uri?eid=2-s2.0-85128314923&doi=10.1109%2fACCESS.2022.3166628&partnerID=40&md5=a90b91845365aabc0a962263342cd2dd
The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital revolution we are currently experiencing. This irrefutable reality is a major reason why cybersecurity defences continue to be a pressing and timely area of research. Traditional countermeasures of cyber defence using boundary controllers and filters such as intrusion detection, access controls, firewalls and so on, have proven ineffective. Such measures fail to account for the attacker's inherent advantage of being increasingly techno-savvy, as well as their persistence in attempting to compromise the security of not only high-value targets, but also the vast pool of oblivious users of technology. The use of decoys and deception is one of the emerging solutions for cyber defence. Leveraging decoys and deception for security pre-date the advent of the digital revolution as centuries have witnessed the military using human decoys to deceive and successfully defeat their adversaries during wars. However, its benefits for reducing cyberattacks in these digital times have not been thoroughly investigated. One of its use requires that fake text documents are positioned in the repository of critical documents in order to mislead and catch hackers attempting to exfiltrate sensitive documents. Current methods of generating fake text documents involve using symbols, junk documents, randomly generated texts. Such approaches fail to capture the empirical and linguistic properties of language, resulting in messages that do not scale well, are not realistic, fail in the context of syntax and are semantically void. Consequently, failing to convince the attackers to believe they are the original messages. This paper presents a Cognitive Deception Model (CDM) based on a neural model which takes an input message and generates syntactically cohesive and semantically coherent independent looking but plausible and convincing decoy messages to cognitively burden and deceive the adversaries. The experimental results used to validate the models, as well as the comparison with state-of-the-art tools, show that it outperforms existing systems. © 2013 IEEE.
Institute of Electrical and Electronics Engineers Inc.
21693536
English
Article
All Open Access; Gold Open Access
author Taofeek O.T.; Alawida M.; Alabdulatif A.; Omolara A.E.; Abiodun O.I.
spellingShingle Taofeek O.T.; Alawida M.; Alabdulatif A.; Omolara A.E.; Abiodun O.I.
A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks during Cyber-Attacks
author_facet Taofeek O.T.; Alawida M.; Alabdulatif A.; Omolara A.E.; Abiodun O.I.
author_sort Taofeek O.T.; Alawida M.; Alabdulatif A.; Omolara A.E.; Abiodun O.I.
title A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks during Cyber-Attacks
title_short A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks during Cyber-Attacks
title_full A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks during Cyber-Attacks
title_fullStr A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks during Cyber-Attacks
title_full_unstemmed A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks during Cyber-Attacks
title_sort A Cognitive Deception Model for Generating Fake Documents to Curb Data Exfiltration in Networks during Cyber-Attacks
publishDate 2022
container_title IEEE Access
container_volume 10
container_issue
doi_str_mv 10.1109/ACCESS.2022.3166628
url https://www.scopus.com/inward/record.uri?eid=2-s2.0-85128314923&doi=10.1109%2fACCESS.2022.3166628&partnerID=40&md5=a90b91845365aabc0a962263342cd2dd
description The exponential increase in the compromise of sensitive and intellectual properties alludes to the huge price the global community must pay for the digital revolution we are currently experiencing. This irrefutable reality is a major reason why cybersecurity defences continue to be a pressing and timely area of research. Traditional countermeasures of cyber defence using boundary controllers and filters such as intrusion detection, access controls, firewalls and so on, have proven ineffective. Such measures fail to account for the attacker's inherent advantage of being increasingly techno-savvy, as well as their persistence in attempting to compromise the security of not only high-value targets, but also the vast pool of oblivious users of technology. The use of decoys and deception is one of the emerging solutions for cyber defence. Leveraging decoys and deception for security pre-date the advent of the digital revolution as centuries have witnessed the military using human decoys to deceive and successfully defeat their adversaries during wars. However, its benefits for reducing cyberattacks in these digital times have not been thoroughly investigated. One of its use requires that fake text documents are positioned in the repository of critical documents in order to mislead and catch hackers attempting to exfiltrate sensitive documents. Current methods of generating fake text documents involve using symbols, junk documents, randomly generated texts. Such approaches fail to capture the empirical and linguistic properties of language, resulting in messages that do not scale well, are not realistic, fail in the context of syntax and are semantically void. Consequently, failing to convince the attackers to believe they are the original messages. This paper presents a Cognitive Deception Model (CDM) based on a neural model which takes an input message and generates syntactically cohesive and semantically coherent independent looking but plausible and convincing decoy messages to cognitively burden and deceive the adversaries. The experimental results used to validate the models, as well as the comparison with state-of-the-art tools, show that it outperforms existing systems. © 2013 IEEE.
publisher Institute of Electrical and Electronics Engineers Inc.
issn 21693536
language English
format Article
accesstype All Open Access; Gold Open Access
record_format scopus
collection Scopus
_version_ 1809677892912676864