Abstract
With information systems worldwide being attacked daily, analogies from traditional warfare are apt, and deception tactics have historically proven effective as both a strategy and a technique for Defense. Defensive Deception includes thinking like an attacker and determining the best strategy to counter common attack strategies. Defensive Deception tactics are beneficial at introducing uncertainty for adversaries, increasing their learning costs, and, as a result, lowering the likelihood of successful attacks. In cybersecurity, honeypots and honeytokens and camouflaging and moving target defense commonly employ Defensive Deception tactics. For a variety of purposes, deceptive and anti-deceptive technologies have been created. However, there is a critical need for a broad, comprehensive and quantitative framework that can help us deploy advanced deception technologies. Computational intelligence provides an appropriate set of tools for creating advanced deception frameworks. Computational intelligence comprises two significant families of artificial intelligence technologies: deep learning and machine learning. These strategies can be used in various situations in Defensive Deception technologies. This survey focuses on Defensive Deception tactics deployed using the help of deep learning and machine learning algorithms. Prior work has yielded insights, lessons, and limitations presented in this study. It culminates with a discussion about future directions, which helps address the important gaps in present Defensive Deception research.
Funder
National Research Foundation of Korea
Institute for Information and Communications Technology Promotion
Subject
Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Generative AI in Network Security and Intrusion Detection;Advances in Information Security, Privacy, and Ethics;2024-07-26
2. Application Layer Cyber Deception Without Developer Interaction;2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2024-07-08
3. Addressing Cybersecurity Issues in ERP Systems – Emerging Trends;Proceedings of the International Conference on Business Excellence;2024-06-01
4. A comprehensive survey on cyber deception techniques to improve honeypot performance;Computers & Security;2024-05
5. Explainable AI in Military Training Applications;Advances in Computational Intelligence and Robotics;2024-01-18