2021
DOI: 10.1109/access.2021.3069105
|View full text |Cite
|
Sign up to set email alerts
|

Hidden Markov Model and Cyber Deception for the Prevention of Adversarial Lateral Movement

Abstract: Advanced persistent threats (APTs) have emerged as multi-stage attacks that have targeted nation-states and their associated entities, including private and corporate sectors. Cyber deception has emerged as a defense approach to secure our cyber infrastructure from APTs. Practical deployment of cyber deception relies on defenders' ability to place decoy nodes along the APT path optimally. This paper presents a cyber deception approach focused on predicting the most likely sequence of attack paths and deploying… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(10 citation statements)
references
References 42 publications
0
8
0
Order By: Relevance
“…Here, all the information is stored and processed from the cloud server, which is a time-consuming process that leads to high latency during intrusion detection, increasing the resource wastage of the devices. In addition, a hidden Markov-based cyber deception method is proposed for predicting the attack paths [25]. The proposed method includes graph analysis (reactive) and cyber deception method (proactive) for detecting attack paths.…”
Section: Literature Surveymentioning
confidence: 99%
“…Here, all the information is stored and processed from the cloud server, which is a time-consuming process that leads to high latency during intrusion detection, increasing the resource wastage of the devices. In addition, a hidden Markov-based cyber deception method is proposed for predicting the attack paths [25]. The proposed method includes graph analysis (reactive) and cyber deception method (proactive) for detecting attack paths.…”
Section: Literature Surveymentioning
confidence: 99%
“…In addition, there is a research trend that is also popularly used in research in the use of technology to detect fake news since 2021, namely cyber deception. Some studies present a cyber fraud approach that combines reactive (graphic analysis) and proactive (cyber fraud technology) defenses (Al Amin et al, 2021). In addition, there are studies to explore cyber fraud approaches from threats that include fraudulent methods (Steingartner & Galinec, 2021).…”
Section: State-of-the-art Research In the Use Of Technology For Fake ...mentioning
confidence: 99%
“…Takabi and Jafarian [26] proposed a defense idea that combines deception defense with MTD, which can be used to mitigate internal attacks. Amin et al [27] combined POMCP and Hidden Markov Model and proposed a new path prediction method to prevent the attacker from moving laterally in the internal network.…”
Section: Related Workmentioning
confidence: 99%