The threat of cyber attacks is a growing concern across the world, leading to an increasing need for sophisticated cyber defense techniques. The Tularosa Study, was designed and conducted to understand how defensive deception, both cyber and psychological, affects cyber attackers Ferguson-Walter et al. [2019c]. More specifically, for this empirical study, cyber deception refers to a decoy system and psychological deception refers to false information of the presence of defensive deception techniques on the network. Over 130 red teamers participated in a network penetration test over two days in which we controlled both the presence of and explicit mention of deceptive defensive techniques. To our knowledge, this represents the largest study...
Organizations fall victim to costly attacks every year. This has created a need for more successful ...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
The threat of cyber attacks is a growing concern across the world, leading to an increasing need for...
The Tularosa study was designed to understand how defensive deception--including both cyber and psyc...
Cyber deception is a strategy that defenders can leverage to gain an advantage over cyber attackers....
Cyber deception has been discussed as providing enhanced cyber defense. This human subjects research...
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
The information domain is quickly emerging as a dominant space where adversaries covertly conduct cy...
erimeter based defenses are limited in deterring and defeating cyberattacks. Multi-layered approache...
This paper improves upon recent game-theoretic deceptive signaling schemes for cyber defense using t...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
This article presents findings concerned with the use of neural networks in the identification of de...
Aim The current paper aims to provide a preliminary exploration of the characteristics associated w...
Organizations fall victim to costly attacks every year. This has created a need for more successful ...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
The threat of cyber attacks is a growing concern across the world, leading to an increasing need for...
The Tularosa study was designed to understand how defensive deception--including both cyber and psyc...
Cyber deception is a strategy that defenders can leverage to gain an advantage over cyber attackers....
Cyber deception has been discussed as providing enhanced cyber defense. This human subjects research...
In the evolving landscape of cybersecurity, the utilization of cyber deception has gained prominence...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
The information domain is quickly emerging as a dominant space where adversaries covertly conduct cy...
erimeter based defenses are limited in deterring and defeating cyberattacks. Multi-layered approache...
This paper improves upon recent game-theoretic deceptive signaling schemes for cyber defense using t...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
This article presents findings concerned with the use of neural networks in the identification of de...
Aim The current paper aims to provide a preliminary exploration of the characteristics associated w...
Organizations fall victim to costly attacks every year. This has created a need for more successful ...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...