2020
DOI: 10.48550/arxiv.2007.14497
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Cyber Deception for Computer and Network Security: Survey and Challenges

Abstract: Cyber deception has recently received increasing attentions as a promising mechanism for proactive cyber defense. Cyber deception strategies aim at injecting intentionally falsified information to sabotage the early stage of attack reconnaissance and planning in order to render the final attack action harmless or ineffective.Motivated by recent advances in cyber deception research, we in this paper provide a formal view of cyber deception, and review high-level deception schemes and actions. We also summarize … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(18 citation statements)
references
References 39 publications
0
17
0
Order By: Relevance
“…Recently, Lu et al [90] conducted a brief survey based on the processes of defensive deception consisting of three phases: planning of deception, implementation and deployment of deception, and monitoring and evaluation of deception. The authors discussed deception techniques based on information dissimulation to hide real information and information simulation to focus on attackers.…”
Section: B Comparison With Existing Surveysmentioning
confidence: 99%
“…Recently, Lu et al [90] conducted a brief survey based on the processes of defensive deception consisting of three phases: planning of deception, implementation and deployment of deception, and monitoring and evaluation of deception. The authors discussed deception techniques based on information dissimulation to hide real information and information simulation to focus on attackers.…”
Section: B Comparison With Existing Surveysmentioning
confidence: 99%
“…1) A precise adversarial model. Lu et al [8] point out that a precise adversarial model is the key to create and evaluate a deception strategy. As deception defence leverages attackers' cognitive biases [10], detailing adversarial model of target environment is essential for transferring the weakness of adversaries into defence advantage.…”
Section: Defensive Deception For Cloud Systemmentioning
confidence: 99%
“…It reverses the asymmetry between the defender and attacker by presenting intentionally falsified information. Different from signature-based countermeasures, it actively conceals system properties [7], misleads and traps attackers [8]. For example, Almohri et al [9] propose to conceal target nodes in cloud by organising decoy services.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations