2017
DOI: 10.25046/aj0203161
|View full text |Cite
|
Sign up to set email alerts
|

Towards Deployment Strategies for Deception Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1
1

Relationship

3
4

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Another positive aspect of AI in perimeter security is that it is more cost-effective than the traditional model. AI requires fewer staff and less (Fraunholz et al, 2017 ) maintenance, which means total costs are much lower. Furthermore, AI is also more scalable, meaning it can be used in a wide variety of environments and for a wide variety of applications.…”
Section: Discussionmentioning
confidence: 99%
“…Another positive aspect of AI in perimeter security is that it is more cost-effective than the traditional model. AI requires fewer staff and less (Fraunholz et al, 2017 ) maintenance, which means total costs are much lower. Furthermore, AI is also more scalable, meaning it can be used in a wide variety of environments and for a wide variety of applications.…”
Section: Discussionmentioning
confidence: 99%
“…The introduction of context information into the anomaly detection process is promising and capable of increasing the performance [12]. Furthermore, the employment of deception technologies as sensors for anomaly detection could be used to enhance the insight about malicious behaviour [17].…”
Section: Discussionmentioning
confidence: 99%
“…There is an abundance of examples, where systems that provide full-fledged operating systems are suffering from easy detection, relay attacks and monitoring circumvention [49][50][51][52][53]. To mitigate detection attempts, it is of significant importance to enable a dynamic configuration, deployment and management of such systems [54,55]. However, not only technical requirements need to be considered when applying such technologies.…”
Section: Honeypotsmentioning
confidence: 99%