2021
DOI: 10.1016/j.cose.2021.102288
|View full text |Cite
|
Sign up to set email alerts
|

Three decades of deception techniques in active cyber defense - Retrospect and outlook

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 52 publications
(10 citation statements)
references
References 45 publications
0
8
0
Order By: Relevance
“…A large number of research results have appeared in the field of active defense. Zhang et al 19 reviewed representative techniques in honeypots, honeytokens, and moving target defense, over the past 30 years, and outlooked on future research directions are presented, including dynamic merging of various deception techniques, quantified cheating results and costs of deception operations, hardware‐enabled deception techniques, as well as techniques developed based on better integration of the human factors. Reference 20 proposed that network threats facing malicious nodes can be countered by node authentication schemes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A large number of research results have appeared in the field of active defense. Zhang et al 19 reviewed representative techniques in honeypots, honeytokens, and moving target defense, over the past 30 years, and outlooked on future research directions are presented, including dynamic merging of various deception techniques, quantified cheating results and costs of deception operations, hardware‐enabled deception techniques, as well as techniques developed based on better integration of the human factors. Reference 20 proposed that network threats facing malicious nodes can be countered by node authentication schemes.…”
Section: Related Workmentioning
confidence: 99%
“…A large number of research results have appeared in the field of active defense. Zhang et al 19 effectively and comprehensively assess the overall situation of cyberspace security. Zhao et al 22 described common passive and active defense techniques, and builded a network security system combining active defense and passive defense.…”
Section: Active Defensementioning
confidence: 99%
“…They classify deception techniques depending on which phase of the Cyber Kill-Chain they can deceive an attacker. Honeytokens can be used in eight out of twelve phases to deceive attackers [27].…”
Section: Honeytoken Fingerprintingmentioning
confidence: 99%
“…Decoys must appear realistic to engage the attacker and increase the likelihood of interaction. Traditionally, decoys are general-purpose (possibly vulnerable) applications that are created a-priori and shipped to customers and, as such, they might have little or no fit within the defender ecosystem [4]. Moreover, when prompted by an attacker they cannot ensure the same degree of similarity or interactivity level as the original applications [5] [6] [7].…”
Section: Introductionmentioning
confidence: 99%
“…Although research on decoy placement schemes has addressed some of the challenges related to this allocation problem, it has limitations. Most of the proposed strategies assume that decoys can be located near the organization's network perimeter and thus cannot handle threats that elude the first line of defences or insider attacks propagating within the production environment [4]. Additionally, these schemes often consider a fixed number of decoys that need to be allocated on a predetermined number of system assets.…”
Section: Introductionmentioning
confidence: 99%