2018
DOI: 10.1145/3214305
|View full text |Cite
|
Sign up to set email alerts
|

Deception Techniques in Computer Security

Abstract: A recent trend both in academia and industry is to explore the use of deception techniques to achieve proactive attack detection and defense—to the point of marketing intrusion deception solutions as zero-false-positive intrusion detection. However, there is still a general lack of understanding of deception techniques from a research perspective, and it is not clear how the effectiveness of these solutions can be measured and compared with other security approaches. To shed light on this topic, we introduce a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 79 publications
(55 citation statements)
references
References 64 publications
0
55
0
Order By: Relevance
“…Under dissimulation the authors identify masking (hiding the real by making it invisible), repackaging (hiding the real by disguising) and dazzling (hiding the real by confusion), and under simulation it is included mimicking (showing the false through imitation), inventing (showing the false by displaying a different reality) and decoying (showing the false by diverting attention) [78]. Although deception is considered a usual tactic in CND operations [79][80][81], their study from an offensive point of view is not as usual, so we consider it as a key research line.…”
Section: Discussionmentioning
confidence: 99%
“…Under dissimulation the authors identify masking (hiding the real by making it invisible), repackaging (hiding the real by disguising) and dazzling (hiding the real by confusion), and under simulation it is included mimicking (showing the false through imitation), inventing (showing the false by displaying a different reality) and decoying (showing the false by diverting attention) [78]. Although deception is considered a usual tactic in CND operations [79][80][81], their study from an offensive point of view is not as usual, so we consider it as a key research line.…”
Section: Discussionmentioning
confidence: 99%
“…Existing studies classify cyber deception defense techniques following their deployment in computer network systems [25] or interaction level with attackers [18]. For instance, Honeypot could be deployed in DMZ, Honeytoken in the runtime environment, and Honeyfile in application layer.…”
Section: Cyber Deception Defensementioning
confidence: 99%
“…According to Han et al [25], a successful Honeyfile deployment includes enticing text content to sustain deception and a monitor system to observe and detect malicious behaviors. As EDGE addresses the first issue, a further study to improve monitor system and deployment is worthy of the future investigation.…”
Section: Future Work and Conclusion 61 Future Workmentioning
confidence: 99%
“…This challenge is due to the current approach used in generating deceptive content. Current decoy generation methods employ random unrealistic bogus data, words that are frequently searched on the internet, random word extracted from web data, corpus-based generation, manually created templates for database fields and file attributes [51]- [54]. These approaches fail to convince malicious persons as they fail to generate words and sentences expected to reside within a document, they reveal the underlying file names and metadata, they leak information about the underlying message, thus leading the attacker to reconstruct and extract the underlying message from the decoy document.…”
Section: B Deception-based Approachesmentioning
confidence: 99%
“…Several studies have indicated that creating realistic, enticing, adaptive, with no distinguishable features (from the plaintext contents) is the essential pre-requisite for convincing an adversary to accept a decoy message as the underlying plaintext message during an attack. These features are possible with natural language and artificial intelligence as an adversary can only be convinced when the decoy message reflects the way human uses natural language [51]- [54].…”
Section: B Deception-based Approachesmentioning
confidence: 99%