2022
DOI: 10.3390/s22062194
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions

Abstract: With information systems worldwide being attacked daily, analogies from traditional warfare are apt, and deception tactics have historically proven effective as both a strategy and a technique for Defense. Defensive Deception includes thinking like an attacker and determining the best strategy to counter common attack strategies. Defensive Deception tactics are beneficial at introducing uncertainty for adversaries, increasing their learning costs, and, as a result, lowering the likelihood of successful attacks… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 111 publications
0
4
0
Order By: Relevance
“…Researchers and experts can analyze the patterns and actions [14,2] by engineering such systems to be intentionally vulnerable. As a deceptive technologies, both honeypots and honeynets rest upon a rich literature and have been extensively mapped in regards to critical semantics [1,15,16].…”
Section: Honeypots and Honeynetsmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers and experts can analyze the patterns and actions [14,2] by engineering such systems to be intentionally vulnerable. As a deceptive technologies, both honeypots and honeynets rest upon a rich literature and have been extensively mapped in regards to critical semantics [1,15,16].…”
Section: Honeypots and Honeynetsmentioning
confidence: 99%
“…Dissimilar to intelligent honeypots and honeynets however, learning-based systems examine behavior within the user environment instead of network connections [29,30]. In other words, the system learns what might maximize sojourn time and alters itself to influence the metric towards a theoretical maximal value [31,16]. Strikingly, the majority of effort has gone into integrating reinforcement learning as the underlying ML technique.…”
Section: Learningmentioning
confidence: 99%
“…whether they are supervised, semi-supervised or unsupervised. A review conducted by Mohan et al [7] focused on the applications of various ML and deep learning methods in the implementation of defensive deception. They summarized the classi ication of several deception categories, new machine learning and deep learning techniques in defensive deception, including the models, common datasets, key contributions, and limitations.…”
Section: Introductionmentioning
confidence: 99%
“…As a lightweight counter-measure to mitigate the spatiotemporal defender inferiority issue of IoT systems, and to protect and defend IoT systems against potential advanced persistent threat (APT) attacks, defensive cyber deception techniques [6][7][8] were introduced. Defensive cyber deception techniques are non-cooperative decision-making pollution techniques that mislead potential attackers' cognitive perspectives, deceiving the attackers…”
Section: Introductionmentioning
confidence: 99%