2013
DOI: 10.13052/jcsm2245-1439.224
|View full text |Cite
|
Sign up to set email alerts
|

Detecting Targeted Attacks By Multilayer Deception

Abstract: Over the past few years, enterprises are facing a growing number of highly customized and targeted attacks that use sophisticated techniques and seek after important company assets, such as customer data and intellectual property. Unlike conventional attacks, targeted attacks are operated by experts who use multiple steps to gain access to sensitive assets, and most of time, leave very few network traces behind for detection. In this paper, we propose a multi-layer deception system that provides an in depth de… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…Wang et al [153] propose a multi-layer deception system (see Figure 8), which is composed of honeypot servers and various honeytokens such as honey people, honey files, honey database, and honey activities. The honey people is fake personas created on social network platforms.…”
Section: A Deception In Depthmentioning
confidence: 99%
See 1 more Smart Citation
“…Wang et al [153] propose a multi-layer deception system (see Figure 8), which is composed of honeypot servers and various honeytokens such as honey people, honey files, honey database, and honey activities. The honey people is fake personas created on social network platforms.…”
Section: A Deception In Depthmentioning
confidence: 99%
“…The authentication server is responsible for verifying the client's credential, providing Fig. 8: The multi-layer deception system in [153] requested server's current IP address upon successful authentication, and updating the IP addresses of servers in the server pool. The randomization controller coordinates the mutation of the network.…”
Section: A Deception In Depthmentioning
confidence: 99%
“…other network tracing tools [51]. The collected information is useful in the later stages to deliver payload (the actual intended message that performs malicious action) to the target system.…”
Section: External Cyber Kill Chain Modelmentioning
confidence: 99%
“…Deceit can also be injected into the public data about our systems. Wang et al made the case of disseminating public data about some "fake" personnel for the purpose of catching attacks such as spear phishing [48]. In addition, we note that this category also includes offline stored data such as backups that can be used as a focus of deception.…”
Section: System's Internal and Public Datamentioning
confidence: 99%