2018
DOI: 10.3390/sym10010014
|View full text |Cite
|
Sign up to set email alerts
|

Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat

Abstract: Abstract:We propose a novel dynamic host mutation (DHM) architecture based on moving target defense (MTD) that can actively cope with cyberattacks. The goal of the DHM is to break the cyber kill chain, expand the attack surface to increase the attacker's target analysis cost, and disrupt the attacker's fingerprinting to disable the server trace. We define the participating entities that share the MTD policy within the enterprise network or the critical infrastructure, and define functional modules of each enti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(20 citation statements)
references
References 25 publications
0
20
0
Order By: Relevance
“…[29] stresses the importance of web-based applications and extensively outlines the possible use scenarios of deception techniques which can be incorporated into application-layer traffic of web applications for detecting various web-based application attacks. [30] went further in his research to give an extensive game-theoretical taxonomy for deception-based techniques. [31] In their paper, [32] gives an all-encompassing overview of deception-based technology including in-depth discussions on taxonomies, psychological concepts of deception, implementation of deception based, legal and ethics issues.…”
Section: Related Workmentioning
confidence: 99%
“…[29] stresses the importance of web-based applications and extensively outlines the possible use scenarios of deception techniques which can be incorporated into application-layer traffic of web applications for detecting various web-based application attacks. [30] went further in his research to give an extensive game-theoretical taxonomy for deception-based techniques. [31] In their paper, [32] gives an all-encompassing overview of deception-based technology including in-depth discussions on taxonomies, psychological concepts of deception, implementation of deception based, legal and ethics issues.…”
Section: Related Workmentioning
confidence: 99%
“…, a i n ) denotes the fingerprint of container s i which contains n attributes. Thus, the deception overhead of modifying the fingerprint from f 1 (a 1 1 , . .…”
Section: Deception Overheadmentioning
confidence: 99%
“…Network reconnaissance refers to a precursory step of advanced attacks [1]. Since cloud computing presents a convenient remote network access method, the cyber assets (e.g., containers) are more likely to be identified, enumerated, investigated, and fingerprinted [2], [3].…”
Section: Introductionmentioning
confidence: 99%
“…From previous research [12][13][14] and descriptions related to insider threat detection and analysis based on machine learning methodology, we selected the classification and clustering concepts as well as the related techniques [15,16] for anomaly detection and misuse as the main scope of this research.…”
Section: Insider Threats Based On Machine Learning Approachmentioning
confidence: 99%