[HTML][HTML] A comprehensive survey on cyber deception techniques to improve honeypot performance

A Javadpour, F Ja'fari, T Taleb, M Shojafar… - Computers & …, 2024 - Elsevier
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer
valuable insights into adversary behavior with a low rate of false detections. By diverting the …

MAGD: Minimal attack graph generation dynamically in cyber security

M Mohammadzad, J Karimpour, F Mahan - Computer Networks, 2023 - Elsevier
Cyber security faces challenges in detecting and mitigating complex attacks. Security
solutions have employed Attack Graphs (AGs) for modeling multi-stage attacks, but …

Principle and method of deception systems synthesizing for malware and computer attacks detection

A Kashtalian, S Lysenko, B Savenko… - … and Computer Systems, 2023 - nti.khai.edu
The number of different types and the actual number of malware and computer attacks is
constantly increasing. Therefore, detecting and counteracting malware and computer attacks …

Resource-aware Cyber Deception in Cloud-Native Environments

M Zambianco, C Facchinetti, R Doriguzzi-Corin… - arXiv preprint arXiv …, 2023 - arxiv.org
Cyber deception can be a valuable addition to traditional cyber defense mechanisms,
especially for modern cloud-native environments with a fading security perimeter. However …

Resource-Efficient Low-Rate DDoS Mitigation With Moving Target Defense in Edge Clouds

Y Zhou, G Cheng, Z Ouyang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Edge computing (EC) and container technology have been widely used to increase the
flexibility of computing resources and meet the real-time requirements for delay-sensitive …

Resource-aware Cyber Deception for Microservice-based Applications

M Zambianco, C Facchinetti… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Cyber deception can be a valuable addition to traditional cyber defense mechanisms,
especially for modern cloudnative environments with a fading security perimeter. However …

An Efficient Multiplex Network Model for Effective Honeypot Roaming against DDoS Attacks

J Ren, Q Zhi - IEEE Transactions on Network Science and …, 2023 - ieeexplore.ieee.org
Honeypot roaming represents an effective mechanism against distributed denial of service
(DDoS) attacks at the cost of system resources. Currently, the roaming frequency is set …

A Proactive Decoy Selection Scheme for Cyber Deception using MITRE ATT&CK

M Zambianco, C Facchinetti, D Siracusa - arXiv preprint arXiv:2404.12783, 2024 - arxiv.org
Cyber deception allows compensating the late response of defenders countermeasures to
the ever evolving tactics, techniques, and procedures (TTPs) of attackers. This proactive …

Asymmetric Centrality Game Against Network Epidemic Propagation

W Kouam, Y Hayel, G Deugoué, O Tsemogne… - … Conference on Decision …, 2023 - Springer
The Mirai botnet network epidemic discovered in 2016 falls into the category of numerous
epidemics propagated by attackers over a network to gain control over multiple devices. This …

Game-Theoretic Method for Optimal Initial Allocation of Honeypots for Enhanced Network Security

H Asefi-Ghamari, M Hassani… - … Conference on Smart …, 2024 - ieeexplore.ieee.org
In this paper, we introduce a novel algorithm for the initial placement of honeypots. Our
method is grounded in a two-person, zero-sum game framework that rigorously considers …