From Cyber-Security Deception To Manipulation and Gratification Through Gamification

03/21/2019
by   Xavier Bellekens, et al.
0

With the ever growing networking capabilities and services offered to users, attack surfaces have been increasing exponentially, additionally, the intricacy of network architectures has increased the complexity of cyber-defenses, to this end, the use of deception has recently been trending both in academia and industry. Deception enables to create proactive defense systems, luring attackers in order to better defend the systems at hand. Current applications of deception, only rely on static, or low interactive environments. In this paper we present a platform that combines human-computer-interaction, analytics, gamification and deception to lure malicious users into selected traps while piquing their interests. Furthermore we analyse the interactive deceptive aspects of the platform through the addition of a narrative, further engaging malicious users into following a predefined path and deflecting attacks from key network systems.

READ FULL TEXT
research
01/24/2022

DDoSDet: An approach to Detect DDoS attacks using Neural Networks

Cyber-attacks have been one of the deadliest attacks in today's world. O...
research
05/02/2019

A Survey of Moving Target Defenses for Network Security

Network defense techniques based on traditional tools, techniques, and p...
research
10/23/2018

Building an Emulation Environment for Cyber Security Analyses of Complex Networked Systems

Computer networks are undergoing a phenomenal growth, driven by the rapi...
research
07/27/2022

Railway cyber-security in the era of interconnected systems: a survey

Technological advances in the telecommunications industry have brought s...
research
02/16/2022

CGraph: Graph Based Extensible Predictive Domain Threat Intelligence Platform

Ability to effectively investigate indicators of compromise and associat...
research
06/04/2015

Defending against malicious peripherals with Cinch

Malicious peripherals designed to attack their host computers are a grow...
research
11/29/2022

Sludge for Good: Slowing and Imposing Costs on Cyber Attackers

Choice architecture describes the design by which choices are presented ...

Please sign up or login with your details

Forgot password? Click here to reset