Matches in SemOpenAlex for { <https://semopenalex.org/work/W2774628209> ?p ?o ?g. }
Showing items 1 to 69 of
69
with 100 items per page.
- W2774628209 abstract "Computer network defense has traditionally been provided using reactionary tools such as signature-based detectors, white/blacklisting, intrusion detection/protection systems, etc. While event detection/correlation techniques may identify threats — those threats are then dealt with manually, often employing obstruction-based responses (e.g., blocking). As threat sophistication grows, we find these perimeter-planted security efforts ineffective in combating competent adversaries. In 2015 Gartner, Inc. examined the potential for organizations to use deception as a strategy for thwarting attackers and making it costlier for adversaries to engage in threat campaigns. In today's current research, there are a limited number of deception platforms (tools, etc.) that have successfully been shown to enable strategic deception in a computer network operations environment. Through a deception framework, we conjecture that deception platforms can aid and assist in deceiving the adversary by: obscuring the real target, devaluing information gathering, causing the adversary to waste time and resources, forcing the adversary to reveal advanced capabilities, exposing adversary intent, increasing the difficulty of attack planning, limiting the scope of the attack, and limiting the duration of a successful attack. The objective of this paper is to survey the technological trends in cyber deception research, identify gaps in the techniques, and provide research in the emergent environment. Current findings suggest that network deception tools are attracting the interest of researchers as a valuable security technique that can be implemented to learn more about the nature of cyber attacks; however, there are significant shortcomings in the current approaches and the ability to reason about the adversary." @default.
- W2774628209 created "2017-12-22" @default.
- W2774628209 creator A5015566502 @default.
- W2774628209 creator A5051318197 @default.
- W2774628209 creator A5064888384 @default.
- W2774628209 creator A5076595205 @default.
- W2774628209 creator A5082102698 @default.
- W2774628209 creator A5089270129 @default.
- W2774628209 date "2017-10-01" @default.
- W2774628209 modified "2023-09-23" @default.
- W2774628209 title "Technologies to enable cyber deception" @default.
- W2774628209 cites W1014416335 @default.
- W2774628209 cites W1986495842 @default.
- W2774628209 cites W1996058992 @default.
- W2774628209 cites W2034144210 @default.
- W2774628209 cites W2064462335 @default.
- W2774628209 cites W2072610876 @default.
- W2774628209 cites W2115691067 @default.
- W2774628209 cites W2151915331 @default.
- W2774628209 cites W2608533973 @default.
- W2774628209 cites W2611013608 @default.
- W2774628209 cites W270234110 @default.
- W2774628209 cites W769785222 @default.
- W2774628209 doi "https://doi.org/10.1109/ccst.2017.8167793" @default.
- W2774628209 hasPublicationYear "2017" @default.
- W2774628209 type Work @default.
- W2774628209 sameAs 2774628209 @default.
- W2774628209 citedByCount "5" @default.
- W2774628209 countsByYear W27746282092019 @default.
- W2774628209 countsByYear W27746282092020 @default.
- W2774628209 countsByYear W27746282092021 @default.
- W2774628209 crossrefType "proceedings-article" @default.
- W2774628209 hasAuthorship W2774628209A5015566502 @default.
- W2774628209 hasAuthorship W2774628209A5051318197 @default.
- W2774628209 hasAuthorship W2774628209A5064888384 @default.
- W2774628209 hasAuthorship W2774628209A5076595205 @default.
- W2774628209 hasAuthorship W2774628209A5082102698 @default.
- W2774628209 hasAuthorship W2774628209A5089270129 @default.
- W2774628209 hasBestOaLocation W27746282092 @default.
- W2774628209 hasConcept C108827166 @default.
- W2774628209 hasConcept C15744967 @default.
- W2774628209 hasConcept C2779267917 @default.
- W2774628209 hasConcept C38652104 @default.
- W2774628209 hasConcept C41008148 @default.
- W2774628209 hasConcept C77805123 @default.
- W2774628209 hasConceptScore W2774628209C108827166 @default.
- W2774628209 hasConceptScore W2774628209C15744967 @default.
- W2774628209 hasConceptScore W2774628209C2779267917 @default.
- W2774628209 hasConceptScore W2774628209C38652104 @default.
- W2774628209 hasConceptScore W2774628209C41008148 @default.
- W2774628209 hasConceptScore W2774628209C77805123 @default.
- W2774628209 hasLocation W27746282091 @default.
- W2774628209 hasLocation W27746282092 @default.
- W2774628209 hasOpenAccess W2774628209 @default.
- W2774628209 hasPrimaryLocation W27746282091 @default.
- W2774628209 hasRelatedWork W1996357852 @default.
- W2774628209 hasRelatedWork W2024187985 @default.
- W2774628209 hasRelatedWork W2502904752 @default.
- W2774628209 hasRelatedWork W2904016268 @default.
- W2774628209 hasRelatedWork W2909062875 @default.
- W2774628209 hasRelatedWork W2981338682 @default.
- W2774628209 hasRelatedWork W3024439790 @default.
- W2774628209 hasRelatedWork W4313343363 @default.
- W2774628209 hasRelatedWork W769785222 @default.
- W2774628209 hasRelatedWork W800243639 @default.
- W2774628209 isParatext "false" @default.
- W2774628209 isRetracted "false" @default.
- W2774628209 magId "2774628209" @default.
- W2774628209 workType "article" @default.