Three decades of deception techniques in active cyber defense-retrospect and outlook
L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …
paper, we review representative techniques in honeypots, honeytokens, and moving target …
[PDF][PDF] Sans institute infosec reading room
RF Rights - Risk, 2001 - picture.iczhiku.com
As Technology pushes the limits of removable media-so drives the need for a new file
system in order to support the larger capacities and faster access speeds being designed …
system in order to support the larger capacities and faster access speeds being designed …
Changing the game: The art of deceiving sophisticated attackers
N Virvilis, B Vanautgaerden… - 2014 6th International …, 2014 - ieeexplore.ieee.org
The number and complexity of cyber-attacks has been increasing steadily in the last years.
Adversaries are targeting the communications and information systems (CIS) of government …
Adversaries are targeting the communications and information systems (CIS) of government …
Sauth: Protecting user accounts from password database leaks
Password-based authentication is the dominant form of access control in web services.
Unfortunately, it proves to be more and more inadequate every year. Even if users choose …
Unfortunately, it proves to be more and more inadequate every year. Even if users choose …
Secure cyber deception architecture and decoy injection to mitigate the insider threat
K Park, S Woo, D Moon, H Choi - Symmetry, 2018 - mdpi.com
We propose a novel dynamic host mutation (DHM) architecture based on moving target
defense (MTD) that can actively cope with cyberattacks. The goal of the DHM is to break the …
defense (MTD) that can actively cope with cyberattacks. The goal of the DHM is to break the …
Role-based deception in enterprise networks
Historically, enterprise network reconnaissance is an active process, often involving port
scanning. However, as routers and switches become more complex, they also become more …
scanning. However, as routers and switches become more complex, they also become more …
Computational decoys for cloud security
Cloud-based applications benefit from the scalability and efficiency offered by server
consolidation and shared facilities. However, the shared nature of cloud infrastructures may …
consolidation and shared facilities. However, the shared nature of cloud infrastructures may …
Deception strategies for web application security: application-layer approaches and a testing platform
M Izagirre - 2017 - diva-portal.org
The popularity of the internet has made the use of web applications ubiquitous and essential
to the daily lives of people, businesses and governments. Web servers and web applications …
to the daily lives of people, businesses and governments. Web servers and web applications …
Identifying and trap** wireless based attacks on networks using deceptive network emulation
G Drummond, P Vilevac - US Patent 10,257,226, 2019 - Google Patents
(57) ABSTRACT A system and method are provided that enable identifying and trap**
cyber security attacks via wireless connectivity on enterprise and corporate networks. A …
cyber security attacks via wireless connectivity on enterprise and corporate networks. A …
[PDF][PDF] Changing the game: The art of deception against sophisticated attackers
N Virvilis, O Serrano - infosec.aueb.gr
The number and complexity of cyber-attacks has been increasing steadily in the last years.
Adversaries are targeting the communication and information systems (CIS) of government …
Adversaries are targeting the communication and information systems (CIS) of government …