2015
DOI: 10.1007/978-3-319-25133-2
|View full text |Cite|
|
Sign up to set email alerts
|

Cyber Denial, Deception and Counter Deception

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
22
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 44 publications
(22 citation statements)
references
References 0 publications
0
22
0
Order By: Relevance
“…Typically, deception is not applied as a single mechanism for software systems defense. Instead, it is used orthogonally with techniques of denial and obfuscation, which brings particular opportunities for defense [2]. For example, adversaries are manipulated to spend more resources and time to accomplish tasks, which opens the possibility of learning about the attackers' modus operandi rather than merely monitor, detect, and block intrusions.…”
Section: Deception-based Defensementioning
confidence: 99%
See 2 more Smart Citations
“…Typically, deception is not applied as a single mechanism for software systems defense. Instead, it is used orthogonally with techniques of denial and obfuscation, which brings particular opportunities for defense [2]. For example, adversaries are manipulated to spend more resources and time to accomplish tasks, which opens the possibility of learning about the attackers' modus operandi rather than merely monitor, detect, and block intrusions.…”
Section: Deception-based Defensementioning
confidence: 99%
“…Studies on evolutionary biology show that deception plays a key role in the evolution of creatures, representing an advantage over their competitors [1]. This idea has echoed in the virtual world where the use of deception techniques for defense is currently a relevant component of active defense [2]. Deception aims at altering the perception of attackers by using negative information (fictions) or deliberate actions in favor of the defense [3].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The approach utilised by cybercriminals has made threat intelligence no longer a trivial aspect of defence for organisations due to the leveraging of Advance Persistent Threat (APT) [20], [23]- [25]. APT represents wellresourced and trained adversaries [20] that aims in acquiring high target and valued information.…”
Section: Introductionmentioning
confidence: 99%
“…While malware detection and mitigation research is not new, effectively detecting and mitigating malware remains challenging due to the constant evolution of malware and malware authors [30]. Cyber Kill Chain (CKC) is one of the most widely used operational threat intelligence models to explain intrusion campaigns activities [23], [31]. CKC is based on the kill chain tactic of the US military's F2T2EA (find, fix, track, target, engage and assess) [20], and contains seven stages/steps as shown on Figure 1 [20], [23], [31]- [34].…”
Section: Introductionmentioning
confidence: 99%