Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats 2016
DOI: 10.1145/2995959.2995962
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Deception

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 53 publications
(16 citation statements)
references
References 20 publications
0
16
0
Order By: Relevance
“…In [101], an SDN-based system is proposed, capable of deceiving reconnaissance attacks by providing every host within the network with different views. The proposed system is capable of performing address translation, path mutation, moving vulnerable hosts, and placing honeypots, as well as detecting malicious traffic flows.…”
Section: Architectures Utilizing Multiple Mtd Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In [101], an SDN-based system is proposed, capable of deceiving reconnaissance attacks by providing every host within the network with different views. The proposed system is capable of performing address translation, path mutation, moving vulnerable hosts, and placing honeypots, as well as detecting malicious traffic flows.…”
Section: Architectures Utilizing Multiple Mtd Methodsmentioning
confidence: 99%
“…Out of the architectures utilizing SDN, by far the most popular choice to implement them was by using Mininet [124], although the choice of SDN controllers varied greatly. Among the most popular controllers used throughout the surveyed literature were POX [125], used by [94,101,109,112] and Ryu [59] used in [72,74,79,84]. Other choices of controllers include ONOS [55], which appeared in [73,86,120].…”
Section: Testbedsmentioning
confidence: 99%
See 1 more Smart Citation
“…We decide on the above datasets considering the target scope of our work for the following reasons: 1) we come after the precedent data collection principle to experiment on the text content of academic papers; 2) as it is very unlikely to test on real enterprises' intellectual property digital documents, we choose the medical academic method and results for they are plausible to share similarities with the context of development details and tests results in the medical industry; 3) the context of a patent is a common style of technical writing, which is supposed to mimic engineering design description text. Our datasets 3 are available for future study.…”
Section: Datasets and Parameter Settingmentioning
confidence: 99%
“…Varonis's 2019 Data Breach Statistics have stated that the largest APT has persisted for 30 years in Boeing, while only 3% of a company's folders are protected on average under investigation. Considering the insufficiency of perimeter-based security solutions, researchers design and deploy deceptive entities to actively defend and deter APTs without acquiring prior knowledge on attacks, that is, cyber deception defense [2] [3]. Such defense mechanism not only collect, record, and report on underlying threats through deliberately exposing deceptive information, but also camouflages target assets.…”
Section: Introductionmentioning
confidence: 99%