Survey on cyber deception
The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,h...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2017-12-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017281/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539511121608704 |
---|---|
author | Zhao-peng JIA Bin-xing FANG Chao-ge LIU Qi-xu LIU Jian-bao LIN |
author_facet | Zhao-peng JIA Bin-xing FANG Chao-ge LIU Qi-xu LIU Jian-bao LIN |
author_sort | Zhao-peng JIA |
collection | DOAJ |
description | The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed. |
format | Article |
id | doaj-art-6d503fbab528466eba36b1ad92f4f8a1 |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2017-12-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-6d503fbab528466eba36b1ad92f4f8a12025-01-14T07:13:31ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2017-12-013812814359714160Survey on cyber deceptionZhao-peng JIABin-xing FANGChao-ge LIUQi-xu LIUJian-bao LINThe asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017281/cyber deceptioncognitive processattackdefense |
spellingShingle | Zhao-peng JIA Bin-xing FANG Chao-ge LIU Qi-xu LIU Jian-bao LIN Survey on cyber deception Tongxin xuebao cyber deception cognitive process attack defense |
title | Survey on cyber deception |
title_full | Survey on cyber deception |
title_fullStr | Survey on cyber deception |
title_full_unstemmed | Survey on cyber deception |
title_short | Survey on cyber deception |
title_sort | survey on cyber deception |
topic | cyber deception cognitive process attack defense |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2017281/ |
work_keys_str_mv | AT zhaopengjia surveyoncyberdeception AT binxingfang surveyoncyberdeception AT chaogeliu surveyoncyberdeception AT qixuliu surveyoncyberdeception AT jianbaolin surveyoncyberdeception |