Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions

PV Mohan, S Dixit, A Gyaneshwar, U Chadha… - Sensors, 2022 - mdpi.com
With information systems worldwide being attacked daily, analogies from traditional warfare
are apt, and deception tactics have historically proven effective as both a strategy and a …

SOD2G: A study on a social-engineering organizational defensive deception game framework through optimization of spatiotemporal MTD and decoy conflict

S Seo, D Kim - Electronics, 2021 - mdpi.com
Existing moving target defense (MTD) and decoy systems are conceptually limited in
avoiding and preventing attackers' social-engineering real-time attacks by organization …

IoDM: A study on a IoT-based organizational deception modeling with adaptive general-sum game competition

S Seo, D Kim - Electronics, 2022 - mdpi.com
Moving target defense (MTD) and decoy strategies, measures of active defense, were
introduced to secure both the proactive security and reactive adaptability of internet-of-things …

A Graph-Based Technique for Securing the Distributed Cyber-Physical System Infrastructure

M Kalinin, E Zavadskii, A Busygin - Sensors, 2023 - mdpi.com
Spreading digitalization, flexibility, and autonomy of technological processes in cyber-
physical systems entails high security risks corresponding to negative consequences of the …

OSINT-based LPC-MTD and HS-decoy for organizational defensive deception

S Seo, D Kim - Applied Sciences, 2021 - mdpi.com
This study aimed to alleviate the theoretical limitations of existing moving target defense
(MTD) and decoy concepts and improve the efficiency of defensive deception technology …

A study of the ordinal scale classification algorithm for cyber threat intelligence based on deception technology

S Yoo, T Lee - Electronics, 2023 - mdpi.com
Cyber deception technology plays an important role in monitoring attackers' activities and
detecting new attack types. However, in a deceptive environment, low-risk attack traffic, such …

A Complete Analysis on the Risk of Using Quantal Response: When Attacker Maliciously Changes Behavior under Uncertainty

TH Nguyen, A Yadav - Games, 2022 - mdpi.com
In security games, the defender often has to predict the attacker's behavior based on some
observed attack data. However, a clever attacker can intentionally change its behavior to …