Share Email Print

Proceedings Paper

IOT honeynet for military deception and indications and warnings
Author(s): Peter J. Hanson; Lucas Truax; David D. Saranchak
Format Member Price Non-Member Price
PDF $14.40 $18.00
cover GOOD NEWS! Your organization subscribes to the SPIE Digital Library. You may be able to download this paper for free. Check Access

Paper Abstract

Honeyman, named for the American Revolutionary War spy and source of disinformation, is an IoT distributed deception platform (DDP), aka “honeynet”, based approach to military deception and indications and warning (I&W) generation. While DDP approaches have evolved from single honeypots to complex network architectures and have resolved previous challenges associated with revealing a DDP’s signature or “fingerprint” including virtual device information, and therefore have become applicable for IoT uses, these approaches are still bounded in their application to cybersecurity purposes only. For example, data positioned as cyber-bait is meant only to draw in a cyber attacker but not to influence a strategic level of decision-making such as military or national security decisions. Additionally, monitoring within the DDP gathers data to model attackers’ cyber behavior and patterns for explicit purpose of identifying new offensive cyber techniques and thwarting new attacks. Honeyman combines a proxy military logistics and readiness reporting IoT comprised of a mixture of virtual and physical devices with non-cyber information operations for military deception and to stimulate nation-state adversary behavior within the DDP. A machine learning (ML)-based traffic analysis model leverages observations within the honeynet to forecast an adversary’s physical military activity thereby providing critical I&W. Further research is needed to optimize the combination of physical and virtual IoT devices for best deception performance, to evolve the tradecraft of dynamic cyber-bait, and to refine appropriate ML-based I&W models.

Paper Details

Date Published: 3 May 2018
PDF: 11 pages
Proc. SPIE 10643, Autonomous Systems: Sensors, Vehicles, Security, and the Internet of Everything, 106431A (3 May 2018); doi: 10.1117/12.2305071
Show Author Affiliations
Peter J. Hanson, Concurrent Technologies Corp. (United States)
Lucas Truax, Concurrent Technologies Corp. (United States)
David D. Saranchak, Concurrent Technologies Corp. (United States)

Published in SPIE Proceedings Vol. 10643:
Autonomous Systems: Sensors, Vehicles, Security, and the Internet of Everything
Michael C. Dudzik; Jennifer C. Ricklin, Editor(s)

© SPIE. Terms of Use
Back to Top