Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs. Practical deployment of cyber deception relies on defenders\u27 ability to place decoy nodes along the APT path optimally. This paper presents a cyber deception approach focused on predicting the most likely sequence of attack paths and deploying decoy nodes along the predicted path. Our proposed approach combines reactive (graph analysis) and proactive (cyber deception technology) defense to thwart the adversaries\u27 lateral movement. The proposed approach is realized thr...
The growth of information and communication technology is constantly revolutionizing various domains...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-sta...
The high connectivity of modern cyber networks and devices has brought many improvements to the func...
In modern days, cyber networks need continuous monitoring to keep the network secure and available t...
Cyber security has become a matter of a global interest and several attacks target industrial compan...
Cyber security has become a matter of a global interest and several attacks target industrial compan...
Significant valuable information can be determined by observing attackers in action. These observati...
17 USC 105 interim-entered record; under temporary embargo.For moving target defense (MTD) to shift ...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
This paper aims to explore the cyber deception- based approach and to design a novel conceptual mode...
Moving target defense (MTD) is a promising strategy for gaining advantage over cyber attackers, but ...
In this article, we propose a novel method that aims to improve upon existing moving-target defences...
The growth of information and communication technology is constantly revolutionizing various domains...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...
Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-sta...
The high connectivity of modern cyber networks and devices has brought many improvements to the func...
In modern days, cyber networks need continuous monitoring to keep the network secure and available t...
Cyber security has become a matter of a global interest and several attacks target industrial compan...
Cyber security has become a matter of a global interest and several attacks target industrial compan...
Significant valuable information can be determined by observing attackers in action. These observati...
17 USC 105 interim-entered record; under temporary embargo.For moving target defense (MTD) to shift ...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
This paper aims to explore the cyber deception- based approach and to design a novel conceptual mode...
Moving target defense (MTD) is a promising strategy for gaining advantage over cyber attackers, but ...
In this article, we propose a novel method that aims to improve upon existing moving-target defences...
The growth of information and communication technology is constantly revolutionizing various domains...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
In this day and age, adversaries in the cybersecurity space have become alarmingly capable of identi...