GLOBECOM 2020 - 2020 IEEE Global Communications Conference 2020
DOI: 10.1109/globecom42002.2020.9348122
|View full text |Cite
|
Sign up to set email alerts
|

Software Diversity for Cyber Deception

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…prediction error probability at databases download cost The concept of deception has been studied as a tool for cyber defense [18][19][20][21][22], where the servers deceive attackers, adversaries, and eavesdroppers to eliminate any harmful activities. In all such cases, the deceiver (servers in this case) gains nothing from the deceived, i.e., attackers, adversaries, and eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…prediction error probability at databases download cost The concept of deception has been studied as a tool for cyber defense [18][19][20][21][22], where the servers deceive attackers, adversaries, and eavesdroppers to eliminate any harmful activities. In all such cases, the deceiver (servers in this case) gains nothing from the deceived, i.e., attackers, adversaries, and eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%
“…e traditional honeypot systems are mainly based on physical devices or virtual machines, and the deployment and configuration processes are very complicated. erefore, it is more inclined to adopt the static deployment strategies, which are usually combined with game theory [2] or graph theory [3]. Such a deployment strategy is inflexible and does not scale well, which is difficult to accurately reflect the defender's dynamic cognitive process of the attackers.…”
Section: Introductionmentioning
confidence: 99%