An Efficient Strategy for Deploying Deception Technology

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This article introduces a methodology for maximizing the effectiveness of deception technology in detecting sophisticated cyber attacks and overcoming the limitation of intrusion detection systems’ ability. The proposed methods implement multi-layered deception techniques at different network, system, and application levels to enhance coverage and improve attack detection by using decoys that mimic real systems to attract and identify potential attackers. The method proposes dynamic adaptation to changes in the network environment and employs obfuscation to maintain the effectiveness of the proposed techniques. Implementing this method can provide organizations with an early warning system to respond quickly and mitigate potential damage from cyber attacks, and we shall prove that by performing multiple cyber attacks towards a network with an intrusion detection system and decoys, then compare the detection capability on both technologies.

Original languageEnglish
Title of host publicationFuture Access Enablers for Ubiquitous and Intelligent Infrastructures - 7th EAI International Conference, FABULOUS 2023, Proceedings
EditorsDragan Perakovic, Lucia Knapcikova
PublisherSpringer Science and Business Media Deutschland GmbH
Pages177-194
Number of pages18
ISBN (Print)9783031500503
DOIs
Publication statusPublished - 2024
Event7th EAI International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures, EAI FABULOUS 2023 - Bratislava, Slovakia
Duration: Oct 24 2023Oct 26 2023

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume542 LNICST
ISSN (Print)1867-8211
ISSN (Electronic)1867-822X

Conference

Conference7th EAI International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures, EAI FABULOUS 2023
Country/TerritorySlovakia
CityBratislava
Period10/24/2310/26/23

Keywords

  • Deception
  • Deception attributes
  • Network Attacks
  • intrusion detection system

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'An Efficient Strategy for Deploying Deception Technology'. Together they form a unique fingerprint.

Cite this