Cyber Deception for Computer and Network Security: Survey and Challenges

07/28/2020
by   Zhuo Lu, et al.
0

Cyber deception has recently received increasing attentions as a promising mechanism for proactive cyber defense. Cyber deception strategies aim at injecting intentionally falsified information to sabotage the early stage of attack reconnaissance and planning in order to render the final attack action harmless or ineffective. Motivated by recent advances in cyber deception research, we in this paper provide a formal view of cyber deception, and review high-level deception schemes and actions. We also summarize and classify recent research results of cyber defense techniques built upon the concept of cyber deception, including game-theoretic modeling at the strategic level, network-level deception, in-host-system deception and cryptography based deception. Finally, we lay out and discuss in detail the research challenges towards developing full-fledged cyber deception frameworks and mechanisms.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/07/2020

A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception

In this chapter, we present an approach using formal methods to synthesi...
research
10/04/2021

Realizing Forward Defense in the Cyber Domain

With the recognition of cyberspace as an operating domain, concerted eff...
research
09/01/2023

A Survey of Network Requirements for Enabling Effective Cyber Deception

In the evolving landscape of cybersecurity, the utilization of cyber dec...
research
04/08/2021

Three Decades of Deception Techniques in Active Cyber Defense – Retrospect and Outlook

Deception techniques have been widely seen as a game changer in cyber de...
research
07/01/2019

Strategic Learning for Active, Adaptive, and Autonomous Cyber Defense

The increasing instances of advanced attacks call for a new defense para...
research
12/26/2020

Harnessing Machine Learning, Data Analytics, and Computer-Aided Testing for Cyber Security Applications

While media reports frequently highlight the exciting aspects of the cyb...
research
06/11/2023

Adversarial Reconnaissance Mitigation and Modeling

Adversarial reconnaissance is a crucial step in sophisticated cyber-atta...

Please sign up or login with your details

Forgot password? Click here to reset