Three decades of deception techniques in active cyber defense-retrospect and outlook

L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …

Demystifying deception technology: A survey

D Fraunholz, SD Anton, C Lipps, D Reti… - arXiv preprint arXiv …, 2018 - arxiv.org
Deception boosts security for systems and components by denial, deceit, misinformation,
camouflage and obfuscation. In this work an extensive overview of the deception technology …

An adaptive honeypot configuration, deployment and maintenance strategy

D Fraunholz, M Zimmermann… - 2017 19th International …, 2017 - ieeexplore.ieee.org
Since honeypots first appeared as an advanced network security concept they suffer from
poor deployment and maintenance strategies. State-of-the-Art deployment is a manual …

Approaches for preventing honeypot detection and compromise

M Tsikerdekis, S Zeadally… - 2018 Global …, 2018 - ieeexplore.ieee.org
Honeypots have been used extensively for over two decades. However, their development
is rarely accompanied with an understanding of how attackers are able to detect them …

On designing low-risk honeypots using generative pre-trained transformer models with curated inputs

J Ragsdale, RV Boppana - IEEE Access, 2023 - ieeexplore.ieee.org
Honeypots are utilized as defensive tools within a monitored environment to engage
attackers and gather artifacts for the development of indicators of compromise. However …

Qrassh-a self-adaptive ssh honeypot driven by q-learning

A Pauna, AC Iacob, I Bica - 2018 international conference on …, 2018 - ieeexplore.ieee.org
Developed for the first time in the 80s, honeypot systems research increased tremendously
in the last decade. Moving from simple monitored, emulated, Internet Services, towards …

RASSH-Reinforced adaptive SSH honeypot

A Pauna, I Bica - 2014 10th International Conference on …, 2014 - ieeexplore.ieee.org
The wide spread of cyber-attacks made the need of gathering as much information as
possible about them, a real demand in nowadays global context. The honeypot systems …

Towards basic design principles for high-and medium-interaction honeypots

D Fraunholz, F Pohl, HD Schotten - Proceedings of 16th …, 2017 - books.google.com
Recently, the increase of interconnectivity has led to a rising amount of threats in the
cyberspace. Reconnaissance is crucial to develop and optimize mitigation strategies against …

On the detection and handling of security incidents and perimeter breaches-a modular and flexible honeytoken based framework

D Fraunholz, D Krohmer, F Pohl… - 2018 9th IFIP …, 2018 - ieeexplore.ieee.org
Information security is a fast-changing domain. Traditional security mechanisms such as
firewalls and access control are circumvented regularly. The amount of significant security …

A taxonomy for dynamic honeypot measures of effectiveness

JM Pittman, K Hoffpauir, N Markle… - arXiv preprint arXiv …, 2020 - arxiv.org
Honeypots are computing systems used to capture unauthorized, often malicious, activity.
While honeypots can take on a variety of forms, researchers agree the technology is useful …