2015
DOI: 10.1109/mc.2015.104
|View full text |Cite
|
Sign up to set email alerts
|

Denial and Deception in Cyber Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
16
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 40 publications
(18 citation statements)
references
References 1 publication
1
16
0
1
Order By: Relevance
“…To overcome these two shortcomings, many proactive defense mechanisms have been widely adopted as alternative measures to disrupt and resist PSFA. Recent research on mainstream proactive defense mechanisms can be divided into two major categories: (i) moving target defense (MTD) [5][6][7] which aims at adding uncertainty and randomness in system configuration to ensure the information gathered by the attacker invalid; (ii) deception-based cyber defense (DCD) [8][9][10] which focuses on providing false information to confuse and deceive the attacker. For example, to enhance the network's resilience, Borbor et al [11] developed an automated approach to diversifying network services under various cost constraints based on the extended resource graph model.…”
Section: Related Workmentioning
confidence: 99%
“…To overcome these two shortcomings, many proactive defense mechanisms have been widely adopted as alternative measures to disrupt and resist PSFA. Recent research on mainstream proactive defense mechanisms can be divided into two major categories: (i) moving target defense (MTD) [5][6][7] which aims at adding uncertainty and randomness in system configuration to ensure the information gathered by the attacker invalid; (ii) deception-based cyber defense (DCD) [8][9][10] which focuses on providing false information to confuse and deceive the attacker. For example, to enhance the network's resilience, Borbor et al [11] developed an automated approach to diversifying network services under various cost constraints based on the extended resource graph model.…”
Section: Related Workmentioning
confidence: 99%
“…The game is focused on the integration of cyber attack and defense capabilities into warfare. Cyber capabilities follow a simplified version of the cyber kill chain first proposed by Lockheed Martin [32] including reconnaissance, gaining access, and exploitation. Three examples of cyber capabilities are included in Figure 1.…”
Section: Multi-domain Command and Control Trading Card Gamementioning
confidence: 99%
“…Deception-based strategies have been applied as countermeasures to delay, detect and confuse an adversary attempting to steal data on a network [46]. In 2015, Kaghazgaran and Takabi [47] proposed honey permission, a deception model integrated into a role-based access control model to address insider threat using access control.…”
Section: B Deception-based Approachesmentioning
confidence: 99%