Three decades of deception techniques in active cyber defense-retrospect and outlook

L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …

[PDF][PDF] Sans institute infosec reading room

RF Rights - Risk, 2001 - picture.iczhiku.com
As Technology pushes the limits of removable media-so drives the need for a new file
system in order to support the larger capacities and faster access speeds being designed …

Changing the game: The art of deceiving sophisticated attackers

N Virvilis, B Vanautgaerden… - 2014 6th International …, 2014 - ieeexplore.ieee.org
The number and complexity of cyber-attacks has been increasing steadily in the last years.
Adversaries are targeting the communications and information systems (CIS) of government …

Sauth: Protecting user accounts from password database leaks

G Kontaxis, E Athanasopoulos, G Portokalidis… - Proceedings of the …, 2013 - dl.acm.org
Password-based authentication is the dominant form of access control in web services.
Unfortunately, it proves to be more and more inadequate every year. Even if users choose …

Secure cyber deception architecture and decoy injection to mitigate the insider threat

K Park, S Woo, D Moon, H Choi - Symmetry, 2018 - mdpi.com
We propose a novel dynamic host mutation (DHM) architecture based on moving target
defense (MTD) that can actively cope with cyberattacks. The goal of the DHM is to break the …

Role-based deception in enterprise networks

I Anjum, M Zhu, I Polinsky, W Enck, MK Reiter… - Proceedings of the …, 2021 - dl.acm.org
Historically, enterprise network reconnaissance is an active process, often involving port
scanning. However, as routers and switches become more complex, they also become more …

Computational decoys for cloud security

G Kontaxis, M Polychronakis, AD Keromytis - Secure Cloud Computing, 2013 - Springer
Cloud-based applications benefit from the scalability and efficiency offered by server
consolidation and shared facilities. However, the shared nature of cloud infrastructures may …

Deception strategies for web application security: application-layer approaches and a testing platform

M Izagirre - 2017 - diva-portal.org
The popularity of the internet has made the use of web applications ubiquitous and essential
to the daily lives of people, businesses and governments. Web servers and web applications …

Identifying and trap** wireless based attacks on networks using deceptive network emulation

G Drummond, P Vilevac - US Patent 10,257,226, 2019 - Google Patents
(57) ABSTRACT A system and method are provided that enable identifying and trap**
cyber security attacks via wireless connectivity on enterprise and corporate networks. A …

[PDF][PDF] Changing the game: The art of deception against sophisticated attackers

N Virvilis, O Serrano - infosec.aueb.gr
The number and complexity of cyber-attacks has been increasing steadily in the last years.
Adversaries are targeting the communication and information systems (CIS) of government …