Survey on cyber deception

The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,h...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhao-peng JIA, Bin-xing FANG, Chao-ge LIU, Qi-xu LIU, Jian-bao LIN
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2017-12-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017281/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539511121608704
author Zhao-peng JIA
Bin-xing FANG
Chao-ge LIU
Qi-xu LIU
Jian-bao LIN
author_facet Zhao-peng JIA
Bin-xing FANG
Chao-ge LIU
Qi-xu LIU
Jian-bao LIN
author_sort Zhao-peng JIA
collection DOAJ
description The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.
format Article
id doaj-art-6d503fbab528466eba36b1ad92f4f8a1
institution Kabale University
issn 1000-436X
language zho
publishDate 2017-12-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-6d503fbab528466eba36b1ad92f4f8a12025-01-14T07:13:31ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-12-013812814359714160Survey on cyber deceptionZhao-peng JIABin-xing FANGChao-ge LIUQi-xu LIUJian-bao LINThe asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017281/cyber deceptioncognitive processattackdefense
spellingShingle Zhao-peng JIA
Bin-xing FANG
Chao-ge LIU
Qi-xu LIU
Jian-bao LIN
Survey on cyber deception
Tongxin xuebao
cyber deception
cognitive process
attack
defense
title Survey on cyber deception
title_full Survey on cyber deception
title_fullStr Survey on cyber deception
title_full_unstemmed Survey on cyber deception
title_short Survey on cyber deception
title_sort survey on cyber deception
topic cyber deception
cognitive process
attack
defense
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017281/
work_keys_str_mv AT zhaopengjia surveyoncyberdeception
AT binxingfang surveyoncyberdeception
AT chaogeliu surveyoncyberdeception
AT qixuliu surveyoncyberdeception
AT jianbaolin surveyoncyberdeception