TY - GEN
T1 - An Efficient Strategy for Deploying Deception Technology
AU - Alhosani, Noora
AU - Alrabaee, Saed
AU - Faresi, Ahmed Al
N1 - Publisher Copyright:
© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2024.
PY - 2024
Y1 - 2024
N2 - This article introduces a methodology for maximizing the effectiveness of deception technology in detecting sophisticated cyber attacks and overcoming the limitation of intrusion detection systems’ ability. The proposed methods implement multi-layered deception techniques at different network, system, and application levels to enhance coverage and improve attack detection by using decoys that mimic real systems to attract and identify potential attackers. The method proposes dynamic adaptation to changes in the network environment and employs obfuscation to maintain the effectiveness of the proposed techniques. Implementing this method can provide organizations with an early warning system to respond quickly and mitigate potential damage from cyber attacks, and we shall prove that by performing multiple cyber attacks towards a network with an intrusion detection system and decoys, then compare the detection capability on both technologies.
AB - This article introduces a methodology for maximizing the effectiveness of deception technology in detecting sophisticated cyber attacks and overcoming the limitation of intrusion detection systems’ ability. The proposed methods implement multi-layered deception techniques at different network, system, and application levels to enhance coverage and improve attack detection by using decoys that mimic real systems to attract and identify potential attackers. The method proposes dynamic adaptation to changes in the network environment and employs obfuscation to maintain the effectiveness of the proposed techniques. Implementing this method can provide organizations with an early warning system to respond quickly and mitigate potential damage from cyber attacks, and we shall prove that by performing multiple cyber attacks towards a network with an intrusion detection system and decoys, then compare the detection capability on both technologies.
KW - Deception
KW - Deception attributes
KW - Network Attacks
KW - intrusion detection system
UR - http://www.scopus.com/inward/record.url?scp=85180636481&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85180636481&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-50051-0_13
DO - 10.1007/978-3-031-50051-0_13
M3 - Conference contribution
AN - SCOPUS:85180636481
SN - 9783031500503
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 177
EP - 194
BT - Future Access Enablers for Ubiquitous and Intelligent Infrastructures - 7th EAI International Conference, FABULOUS 2023, Proceedings
A2 - Perakovic, Dragan
A2 - Knapcikova, Lucia
PB - Springer Science and Business Media Deutschland GmbH
T2 - 7th EAI International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures, EAI FABULOUS 2023
Y2 - 24 October 2023 through 26 October 2023
ER -