2021
DOI: 10.24251/hicss.2021.244
|View full text |Cite
|
Sign up to set email alerts
|

Towards Self-Adaptive Cyber Deception for Defense

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…We down selected articles to a final sample of 23 (Table 2) in total or 16 unique articles. Notably, four articles [46,53,34,47] appear in multiple categories. Overall, the inclusion criteria consisted of a publication date in the range of 2018 to 2022, available PDF or text of the paper downloadable, and a demonstrated implementation of associated keywords.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…We down selected articles to a final sample of 23 (Table 2) in total or 16 unique articles. Notably, four articles [46,53,34,47] appear in multiple categories. Overall, the inclusion criteria consisted of a publication date in the range of 2018 to 2022, available PDF or text of the paper downloadable, and a demonstrated implementation of associated keywords.…”
Section: Methodsmentioning
confidence: 99%
“…In fact, adaptive honeypots and honeynets are the forward edge of state-of-the-art. Such adaptive systems leverage key aspects of dynamic, intelligent, and learning to instantiate responses to environment and behavioral stimuli [32,33,34]. These honeypots and honeynets have an expanded repertoire of behavioral and architectural changes as a result.…”
Section: Adaptivementioning
confidence: 99%
“…By merging autonomic computing and cyber Deception, we can obtain an early defender advantage and counter attacker behaviors through automatic adaptation. Article [ 8 ] proposes implementing the adaptive deception framework, which involves a tiny network consisting of two Windows 7 client computers and a database server. One hundred runs were performed for four different scenarios where the attacker tried to access this network.…”
Section: Ci-enabled Techniques Used In Defensive Deceptionmentioning
confidence: 99%
“…The average successful run time was approx. 256.64 s [ 8 ]. This article showed how the autonomous deception framework increased the attacker runtime by 175% and reduced the successful runs by 89%, resulting in an optimal defense strategy.…”
Section: Ci-enabled Techniques Used In Defensive Deceptionmentioning
confidence: 99%
See 1 more Smart Citation