Cyber Deception: State of the art, Trends and Open challenges

PB López, MG Pérez, P Nespoli - arXiv preprint arXiv:2409.07194, 2024 - arxiv.org
The growing interest in cybersecurity has significantly increased articles designing and
implementing various Cyber Deception (CYDEC) mechanisms. This trend reflects the urgent …

On designing low-risk honeypots using generative pre-trained transformer models with curated inputs

J Ragsdale, RV Boppana - IEEE Access, 2023 - ieeexplore.ieee.org
Honeypots are utilized as defensive tools within a monitored environment to engage
attackers and gather artifacts for the development of indicators of compromise. However …

Adaptive learning-based hybrid recommender system for deception in Internet of Thing

VS Mfogo, A Zemkoho, L Njilla, M Nkenlifack… - Computer Networks, 2024 - Elsevier
In the rapidly evolving Internet of Things (IoT) security domain, device vulnerabilities pose
significant risks, frequently exploited by cyberattackers. Traditional reactive security …

Securing smart cities through machine learning: A honeypot‐driven approach to attack detection in Internet of Things ecosystems

Y Ahmed, K Beyioku, M Yousefi - IET Smart Cities, 2024 - Wiley Online Library
The rapid increase and adoption of Internet of Things (IoT) devices have introduced
unprecedented conveniences into modern life. However, this growth has also ushered in a …

AARF: Autonomous Attack Response Framework for Honeypots to Enhance Interaction Based on Multi-Agent Dynamic Game

L Wang, J Deng, H Tan, Y Xu, J Zhu, Z Zhang, Z Li… - Mathematics, 2024 - mdpi.com
Highly interactive honeypots can form reliable connections by responding to attackers to
delay and capture intranet attacks. However, current research focuses on modeling the …

Don't Stop Believin': A Unified Evaluation Approach for LLM Honeypots

SB Weber, M Feger, M Pilgermann - IEEE Access, 2024 - ieeexplore.ieee.org
The research area of honeypots is gaining new momentum, driven by advancements in
large language models (LLMs). The chat-based applications of generative pretrained …

Relation Extraction Techniques in Cyber Threat Intelligence

DR Arikkat, P Vinod, RR KA, S Nicolazzo… - … on Applications of …, 2024 - Springer
Abstract Cyber Threat Intelligence (CTI) provides a structured and interconnected model for
threat information through Cybersecurity Knowledge Graphs. This allows researchers and …

Evaluating Few-Shot Learning Generative Honeypots in A Live Deployment

J Ragsdale, R Boppana - 2024 IEEE International Conference …, 2024 - ieeexplore.ieee.org
Generative language models have seen an explosion in use for downstream tasks due to
their effectiveness in zero or few-shot learning scenarios. One such use case is the ability to …

Exploring Deception Techniques in Safeguarding IoT Networks from Intruders

R Chaturvedi, N Tyagi, J Pateria… - … Computer Sciences and …, 2024 - ieeexplore.ieee.org
The expansion of Internet of Things devices and its network is not only transforming across
industries but also has been playing an important role in our day-to-day life. Though, this …

Data-Level Cyber Deception in Cloud of Things: Prospects, Issues, and Challenges

N Prabhaker, GS Bopche, M Arock - Cloud of Things, 2024 - taylorfrancis.com
Internet of Things (IoT) and cloud-based technologies offer a new way of delivering
traditional information and communications technology (ICT) services to organizations and …