2023
DOI: 10.1007/s43674-023-00056-0
|View full text |Cite
|
Sign up to set email alerts
|

Deception as a service: Intrusion and Ransomware Detection System for Cloud Computing (IRDS4C)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 28 publications
0
1
0
Order By: Relevance
“…These tools are designed to create a deceptive environment within a network with the aim of misleading, confusing, and ultimately trapping malicious actors and malware. They employ various strategies and technologies to achieve this goal [64][65][66]. A common technique used in deception tools is the deployment of honeypots and honeynets, which essentially act as decoy systems created to mimic real assets within a network.…”
Section: Deception Toolsmentioning
confidence: 99%
“…These tools are designed to create a deceptive environment within a network with the aim of misleading, confusing, and ultimately trapping malicious actors and malware. They employ various strategies and technologies to achieve this goal [64][65][66]. A common technique used in deception tools is the deployment of honeypots and honeynets, which essentially act as decoy systems created to mimic real assets within a network.…”
Section: Deception Toolsmentioning
confidence: 99%