The role and significance of deception systems such as honeypots for slowing down attacks and collecting their signatures are well-known. However, the focus has primarily been on developing individual deception systems, and very few works have focused on developing strategies for a synergistic and strategic combination of these systems to achieve more ambitious deception goals. The objective of this paper is to lay a scientific foundation for cyber deception planning, by (1) presenting a formal deception logic for modeling cyber deception, and (2) introducing a deception framework that augments this formal modeling with necessary quantitative reasoning tools to generate coordinated deception plans. To show expressiveness and evaluate effec...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
Cyber deception is usually synonymous with nefarious activities led by attackers. Motivated attacker...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
Implementations of deception technology is crucial in discovering attacks by creating a controlled a...
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence...
Cyber deception tools are increasingly sophisticated but rely on a limited set of deception techniqu...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
Cyber deception tools are increasingly sophisticated but rely on a limited set of deception techniqu...
In the field of network security, with the ongoing arms race between attackers, seeking new vulnerab...
Cyber deception is used to reverse cyber warfare asymmetry by diverting adversaries to false targets...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
Cyber deception is usually synonymous with nefarious activities led by attackers. Motivated attacker...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
Implementations of deception technology is crucial in discovering attacks by creating a controlled a...
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence...
Cyber deception tools are increasingly sophisticated but rely on a limited set of deception techniqu...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
Cyber deception tools are increasingly sophisticated but rely on a limited set of deception techniqu...
In the field of network security, with the ongoing arms race between attackers, seeking new vulnerab...
Cyber deception is used to reverse cyber warfare asymmetry by diverting adversaries to false targets...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
Cyber deception is usually synonymous with nefarious activities led by attackers. Motivated attacker...