Cyber deception is usually synonymous with nefarious activities led by attackers. Motivated attackers will stop at nothing to accomplish their mission and deception is amongst the tools they use. Cyber defenders have also begun using deception as an instrument to further enhance overall defensive strength. Deception has been leveraged to research attacker behaviors and their associated tactic techniques and procedures using custom built monitoring systems commonly referred to as honeypots. More recently several cyber defense deception models have been proposed to better understand the mechanisms involved with applying deception as a defensive instrument. This paper surveys three models of deception and formulates an abstract view of the dec...
Abstract — Over the years, malicious entities in cyber-space have grown smarter and resourceful. For...
Computer networks have employed a variety of techniques to secure themselves from attackers. A techn...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
Control system cyber security defense mechanisms may employ deception to make it more difficult for ...
Cyber deception is a strategy that defenders can leverage to gain an advantage over cyber attackers....
As the convergence between our physical and digital worlds continue at a rapid pace, securing our di...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
The role and significance of deception systems such as honeypots for slowing down attacks and collec...
Cyber deception is used to reverse cyber warfare asymmetry by diverting adversaries to false targets...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
This paper aims to explore the cyber deception- based approach and to design a novel conceptual mode...
Abstract — Over the years, malicious entities in cyber-space have grown smarter and resourceful. For...
Computer networks have employed a variety of techniques to secure themselves from attackers. A techn...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...
Honeypots are fundamentally means to detect adversary probing and to observe their tactics, techniqu...
This is a chapter in Cyber War and Cyber Terrorism, ed. A. Colarik and L. Janczewski, Hershey, PA: T...
Recently, researchers and practitioners have started to investigate the use of deception for designi...
Traditional cyber security techniques have led to an asymmetric disadvantage for defenders. The defe...
Control system cyber security defense mechanisms may employ deception to make it more difficult for ...
Cyber deception is a strategy that defenders can leverage to gain an advantage over cyber attackers....
As the convergence between our physical and digital worlds continue at a rapid pace, securing our di...
With information systems worldwide being attacked daily, analogies from traditional warfare are apt,...
The role and significance of deception systems such as honeypots for slowing down attacks and collec...
Cyber deception is used to reverse cyber warfare asymmetry by diverting adversaries to false targets...
Deceptive defense techniques (e.g., intrusion detection, firewalls, honeypots, honeynets) are common...
This paper aims to explore the cyber deception- based approach and to design a novel conceptual mode...
Abstract — Over the years, malicious entities in cyber-space have grown smarter and resourceful. For...
Computer networks have employed a variety of techniques to secure themselves from attackers. A techn...
An important way cyber adversaries find vulnerabilities in modern networks is through reconnaissance...