Primer--A Tool for Testing Honeypot Measures of Effectiveness

JM Pittman, K Hoffpauir, N Markle - arXiv preprint arXiv:2011.00582, 2020 - arxiv.org
Honeypots are a deceptive technology used to capture malicious activity. The technology is
useful for studying attacker behavior, tools, and techniques but can be difficult to implement …

[PDF][PDF] Learning cyberattack patterns with active honeypots

WH Chong, CKR Koh - 2018 - upload.wikimedia.org
Honeypots can detect new attacks and vulnerabilities like zero-day exploits, based on an
attacker's behavior. Existing honeypots, however, are typically passive in nature and poor at …

Defensive Cyber Maneuvers to Disrupt Cyber Attackers

J Mckneely, T Sell, K Straub, D Thomas - 2023 - aisel.aisnet.org
Perimeter based defenses are limited in deterring and defeating cyberattacks. Multi-layered
defenses with predictable effects are needed to provide robust cybersecurity against …

Shaping Attacker Behavior: Evaluation of an Enhanced Cyber Maneuver Framework

JAB McKneely, TK Sell, KA Straub, MD Ayenson… - … Conference on Human …, 2022 - Springer
Recent cyberattacks highlight the limitations of perimeter-based defenses and the need for a
multi-layered approach to cybersecurity. Modern cybersecurity best practices include …

ENHANCED CYBER MANEUVER: SHAPING BEHAVIOR THROUGH CYBER EFFECTS

JAB McKneely - 2021 - jscholarship.library.jhu.edu
The information domain is quickly emerging as a dominant space where adversaries
covertly conduct cyberattacks to pilfer sensitive information, disrupt critical infrastructure, and …

Software engineering of deceptive software and systems

NC Rowe, J Rrushi, NC Rowe, J Rrushi - Introduction to Cyberdeception, 2016 - Springer
This chapter considers further details in how to implement the deceptions described in this
book. For readers interested in still more details, Heckman et al.(2015) provides a detailed …