[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack

A Ahmad, J Webb, KC Desouza, J Boorman - Computers & Security, 2019 - Elsevier
Advanced persistent threat (APT) is widely acknowledged to be the most sophisticated and
potent class of security threat. APT refers to knowledgeable human attackers that are …

The role of user behaviour in improving cyber security management

AA Moustafa, A Bello, A Maurushat - Frontiers in Psychology, 2021 - frontiersin.org
Information security has for long time been a field of study in computer science, software
engineering, and information communications technology. The term 'information security'has …

Three decades of deception techniques in active cyber defense-retrospect and outlook

L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …

A large-scale empirical study on the vulnerability of deployed iot devices

B Zhao, S Ji, WH Lee, C Lin, H Weng… - … on Dependable and …, 2020 - ieeexplore.ieee.org
The Internet of Things (IoT) has become ubiquitous and greatly affected peoples' daily lives.
With the increasing development of IoT devices, the corresponding security issues are …

Flow based containerized honeypot approach for network traffic analysis: An empirical study

SC Sethuraman, TG Jadapalli, DPV Sudhakaran… - Computer Science …, 2023 - Elsevier
The world of connected devices has been attributed to applications that relied upon
multitude of devices to acquire and distribute data over extremely diverse networks. This …

Incorporating deception into cyberbattlesim for autonomous defense

E Walter, K Ferguson-Walter, A Ridley - arxiv preprint arxiv:2108.13980, 2021 - arxiv.org
Deceptive elements, including honeypots and decoys, were incorporated into the Microsoft
CyberBattleSim experimentation and research platform. The defensive capabilities of the …

Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions

PV Mohan, S Dixit, A Gyaneshwar, U Chadha… - Sensors, 2022 - mdpi.com
With information systems worldwide being attacked daily, analogies from traditional warfare
are apt, and deception tactics have historically proven effective as both a strategy and a …

Cyber expert feedback: Experiences, expectations, and opinions about cyber deception

KJ Ferguson-Walter, MM Major, CK Johnson… - Computers & …, 2023 - Elsevier
Human behavior is a critical, yet under-studied topic in cybersecurity. Among the techniques
used for cyber defense, for cyber deception, a better understanding of human perception …

D3GF: A study on optimal defense performance evaluation of drone-type moving target defense through game theory

S Seo, H Moon, S Lee, D Kim, J Lee, B Kim… - IEEE …, 2023 - ieeexplore.ieee.org
Based on the paradigm shift in modern warfare, ground forces conduct pilot operations of
wireless unmanned maneuvering systems, such as tactical drones, in the form of manned …