Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are commonly used to prevent cyberattacks. However, most current defense techniques are generic and static, and are often learned and exploited by attackers. It is important to advance from static to dynamic forms of defense that can actively adapt a defense strategy according to the actions taken by individual attackers during an active attack. Our novel research approach relies on cognitive models and experimental games: Cognitive models aim at replicating an attacker’s behavior allowing the creation of personalized, dynamic deceptive defense strategies; experimental games help study human actions, calibrate cognitive models, and validate deceptive s...
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence...
In the field of network security, with the ongoing arms race between attackers, seeking new vulnerab...
Cyber deception is a strategy that defenders can leverage to gain an advantage over cyber attackers....
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
This paper improves upon recent game-theoretic deceptive signaling schemes for cyber defense using t...
The role and significance of deception systems such as honeypots for slowing down attacks and collec...
Cyber deception is used to reverse cyber warfare asymmetry by diverting adversaries to false targets...
Organizations fall victim to costly attacks every year. This has created a need for more successful ...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
The threat of cyber attacks is a growing concern across the world, leading to an increasing need for...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence...
In the field of network security, with the ongoing arms race between attackers, seeking new vulnerab...
Cyber deception is a strategy that defenders can leverage to gain an advantage over cyber attackers....
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
This paper improves upon recent game-theoretic deceptive signaling schemes for cyber defense using t...
The role and significance of deception systems such as honeypots for slowing down attacks and collec...
Cyber deception is used to reverse cyber warfare asymmetry by diverting adversaries to false targets...
Organizations fall victim to costly attacks every year. This has created a need for more successful ...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
The threat of cyber attacks is a growing concern across the world, leading to an increasing need for...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence...
In the field of network security, with the ongoing arms race between attackers, seeking new vulnerab...
Cyber deception is a strategy that defenders can leverage to gain an advantage over cyber attackers....