Cyber Deception: State of the art, Trends and Open challenges

PB López, MG Pérez, P Nespoli - arXiv preprint arXiv:2409.07194, 2024 - arxiv.org
The growing interest in cybersecurity has significantly increased articles designing and
implementing various Cyber Deception (CYDEC) mechanisms. This trend reflects the urgent …

A Deep Reinforcement Learning-based Deception Asset Selection Algorithm in Differential Games

W He, J Tan, Y Guo, K Shang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Currently, there are various problems in the field of network attack-defense analysis and
deception asset deployment of game theory-based, such as difficulties in constructing attack …

Deception in Drone Surveillance Missions: Strategic vs. Learning Approaches

Z Wan, JH Cho, M Zhu, AH Anwar, C Kamhoua… - Proceedings of the …, 2023 - dl.acm.org
Unmanned Aerial Vehicles (UAVs) have been used for surveillance operations, search and
rescue missions, and delivery services. Given their importance and versatility, they naturally …

Research on Multi-stage Proactive Defense Strategy against Intelligent Penetration Attacks

B Hou, S Feng, B Wang, J Yin, J Dai… - 2023 IEEE 6th …, 2023 - ieeexplore.ieee.org
In response to the emerging threat of AI-enabled penetration attacks, characterized by their
high level of automation and adaptability, this paper proposes a multi-stage proactive …

Mee: Adaptive Honeyfile System for Insider Attacker Detection

M Zhu, MP Singh - Cyber Deception: Techniques, Strategies, and Human …, 2022 - Springer
Insider attacks cause significant cybersecurity breaches. They challenge current
cybersecurity approaches. Specifically, in advanced persistent threats (APTs), an adversary …

КОНЦЕПТУАЛЬНА МОДЕЛЬ АРХІТЕКТУРИ МУЛЬТИКОМП'ЮТЕРНИХ СИСТЕМ ІЗ ПРИМАНКАМИ ТА ПАСТКАМИ ДЛЯ ВИЯВЛЕННЯ ТА ПРОТИДІЇ …

А КАШТАЛЬЯН - Information Technology: Computer …, 2023 - journals.politehnica.dp.ua
Анотація В роботі здійснено аналіз такого класу систем виявлення та протидії
зловмисному програмному забезпеченню та комп'ютерним атакам як обманні системи …