A survey of defensive deception: Approaches using game theory and machine learning

M Zhu, AH Anwar, Z Wan, JH Cho… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Defensive deception is a promising approach for cyber defense. Via defensive deception, a
defender can anticipate and prevent attacks by misleading or luring an attacker, or hiding …

Three decades of deception techniques in active cyber defense-retrospect and outlook

L Zhang, VLL Thing - Computers & Security, 2021 - Elsevier
Deception techniques have been widely seen as a game changer in cyber defense. In this
paper, we review representative techniques in honeypots, honeytokens, and moving target …

{UNVEIL}: A {Large-Scale}, automated approach to detecting ransomware

A Kharaz, S Arshad, C Mulliner, W Robertson… - 25th USENIX security …, 2016 - usenix.org
Although the concept of ransomware is not new (ie, such attacks date back at least as far as
the 1980s), this type of malware has recently experienced a resurgence in popularity. In fact …

Cutting the gordian knot: A look under the hood of ransomware attacks

A Kharraz, W Robertson, D Balzarotti, L Bilge… - Detection of Intrusions …, 2015 - Springer
In this paper, we present the results of a long-term study of ransomware attacks that have
been observed in the wild between 2006 and 2014. We also provide a holistic view on how …

Honeywords: Making password-cracking detectable

A Juels, RL Rivest - Proceedings of the 2013 ACM SIGSAC conference …, 2013 - dl.acm.org
We propose a simple method for improving the security of hashed passwords: the
maintenance of additional``honeywords''(false passwords) associated with each user's …

Methods, systems, and media for detecting covert malware

BM Bowen, PV Prabhu, VP Kemerlis… - US Patent …, 2013 - Google Patents
Methods, systems, and media for detecting covert malware are provided. In accordance with
some embodiments, a method for detecting covert malware in a computing environ ment is …

Methods, systems, and media for baiting inside attackers

SJ Stolfo, AD Keromytis, BM Bowen… - US Patent …, 2015 - Google Patents
2009-12-05 Assigned to THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF
NEW YORK reassignment THE TRUSTEES OF COLUMBIA UNIVERSITY IN THE CITY OF …

Methods, systems, and media for masquerade attack detection by monitoring computer user behavior

SJ Stolfo, MB Salem, S Hershkop - US Patent 8,769,684, 2014 - Google Patents
Methods, systems, and media for masquerade attack detec tion by monitoring computer user
behavior are provided. In accordance with some embodiments, a method for detecting …

Baiting inside attackers using decoy documents

BM Bowen, S Hershkop, AD Keromytis… - Security and Privacy in …, 2009 - Springer
The insider threat remains one of the most vexing problems in computer security. A number
of approaches have been proposed to detect nefarious insider actions including user …

Deception techniques in computer security: A research perspective

X Han, N Kheir, D Balzarotti - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
A recent trend both in academia and industry is to explore the use of deception techniques
to achieve proactive attack detection and defense—to the point of marketing intrusion …