2020
DOI: 10.24251/hicss.2020.235
|View full text |Cite
|
Sign up to set email alerts
|

Concealing Cyber-Decoys using Two-Sided Feature Deception Games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…As Shade et al [15] have pointed out, most research on cyber deception tools tends to focus on honeypots [16], suggesting ways to improve them [17], deliver them as a service [18], or to recognise their deficiencies [18], [19]. Where cyber deception research extends beyond honeypots it still tends to build from a computer science or engineering perspective [18], [19], [20], [21] with a smaller number of examples of research that include the impact of humans on cyber deception through, 'cognitive models and experimental games' [22] and 'computational models of human cognition' [20]. The assumption in such research is one of rational decision-making with a focus on formal rules or models in how decisions are made [23].…”
Section: Background and Related Workmentioning
confidence: 99%
“…As Shade et al [15] have pointed out, most research on cyber deception tools tends to focus on honeypots [16], suggesting ways to improve them [17], deliver them as a service [18], or to recognise their deficiencies [18], [19]. Where cyber deception research extends beyond honeypots it still tends to build from a computer science or engineering perspective [18], [19], [20], [21] with a smaller number of examples of research that include the impact of humans on cyber deception through, 'cognitive models and experimental games' [22] and 'computational models of human cognition' [20]. The assumption in such research is one of rational decision-making with a focus on formal rules or models in how decisions are made [23].…”
Section: Background and Related Workmentioning
confidence: 99%
“…For proper implementation of honeypots, defenders need to carefully design the level of deception that would most successfully exploit the trust of attackers. Previous research has manipulated the amount and timing of deception, type and frequency of signals, and the features of the honeypot to exploit the attacker's beliefs [Aggarwal et al, 2016;Miah et al, 2020;. However, past research considered the abstract features of honeypots and has not evaluated the algorithms against human attackers.…”
Section: Introductionmentioning
confidence: 99%
“…Moreover, common honeypots are designed so that they look exactly like the real machine when probed by an adversary or they are completely different. However, this might not be necessary as suggested by Miah [2020]. Instead of manipulating the features of a honeypot to make it look like a real machine, it is possible to use 2-sided deception i.e., make honeypots look like real machines and make real machines look like honeypots.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations