2019
DOI: 10.1109/access.2019.2928359
|View full text |Cite
|
Sign up to set email alerts
|

A Deception Model Robust to Eavesdropping Over Communication for Social Network Systems

Abstract: Communication security deals with attributes such as confidentiality, integrity, and availability. The current strategies used to achieve covertness of communication employs encryption. Encryption techniques minimize eavesdropping on the conversation between the conversing parties by transforming the message into an unreadable form. However, it does not prevent or discourage eavesdroppers from stealing and attempting to decrypt the encrypted messages using a brute-force attack or by randomly guessing the key. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
2

Relationship

2
8

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 41 publications
(50 reference statements)
0
12
0
Order By: Relevance
“…Recently, convolutional neural networks (CNN) have wide applications in video and image recognition, processing of natural language [124], and recommender systems [125]. Also, CNN has a popular application in speech recognition and distant speech recognition that has produced a better result than the DNN.…”
Section: Cnn Models For Pattern Recognitionmentioning
confidence: 99%
“…Recently, convolutional neural networks (CNN) have wide applications in video and image recognition, processing of natural language [124], and recommender systems [125]. Also, CNN has a popular application in speech recognition and distant speech recognition that has produced a better result than the DNN.…”
Section: Cnn Models For Pattern Recognitionmentioning
confidence: 99%
“…The adversary will be confused and may be misdirected to reveal himself if the bogus plaintext is a credential honeytoken. To make the bogus plaintext in HE more deceptive, i.e., contextually correct and domain specific, natural language processing (NLP) based techniques [94] and deep learning (DL) based ones [95] have been used.…”
Section: B Evading the Honeypotmentioning
confidence: 99%
“…36 Deception and decoy-based measures have been applied extensively in the cyber world for curtailing several economic problems. 37 For instance, honeypots are decoy systems intended to lure potential attackers away from critical systems and urging the attackers to remain attached to the system long enough for the system administrator to collect information about their malicious activities. 38 Decoy data —such as decoy documents or valid-looking but fake information generated on demand—are used for detecting and luring away unauthorized access to data.…”
Section: Deception and Decoy-based Systems And Applicationsmentioning
confidence: 99%