Skip to main content

An Efficient Strategy for Deploying Deception Technology

  • Conference paper
  • First Online:
Future Access Enablers for Ubiquitous and Intelligent Infrastructures (FABULOUS 2023)

Abstract

This article introduces a methodology for maximizing the effectiveness of deception technology in detecting sophisticated cyber attacks and overcoming the limitation of intrusion detection systems’ ability. The proposed methods implement multi-layered deception techniques at different network, system, and application levels to enhance coverage and improve attack detection by using decoys that mimic real systems to attract and identify potential attackers. The method proposes dynamic adaptation to changes in the network environment and employs obfuscation to maintain the effectiveness of the proposed techniques. Implementing this method can provide organizations with an early warning system to respond quickly and mitigate potential damage from cyber attacks, and we shall prove that by performing multiple cyber attacks towards a network with an intrusion detection system and decoys, then compare the detection capability on both technologies.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dickinson, K.: Implementer’s guide to deception technologies, SANS Institute Information Security Reading Room, P. 16 (2020)

    Google Scholar 

  2. Major, M., Souza, B., DiVita, J., Ferguson-Walter, K.: Informing autonomous deception systems with cyber expert performance data, arXiv preprint arXiv:2109.00066

  3. Han, X., Kheir, N., Balzarotti, D.: Deception techniques in computer security: a research perspective. ACM Comput. Surv. (CSUR) 51(4), 1–36 (2018)

    Article  Google Scholar 

  4. Chiang, C.-Y. J., et al.: Acyds: an adaptive cyber deception system. In: MILCOM 2016–2016 IEEE Military Communications Conference, pp. 800–805. IEEE (2016)

    Google Scholar 

  5. Srinivasa, S., Pedersen, J.M., Vasilomanolakis, E.: Deceptive directories and “vulnerable” logs: a honeypot study of the ldap and log4j attack landscape. In: 2022 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 442–447. IEEE (2022)

    Google Scholar 

  6. Andrews, K.T.: Deception techniques and technologies in the role of active cyber defense, Ph.D. thesis, Utica College (2020)

    Google Scholar 

  7. Bushby, A.: How deception can change cyber security defences. Computer Fraud Sec. 2019(1), 12–14 (2019)

    Article  Google Scholar 

  8. Xu, Y., Chai, S., Shi, P., Zhang, B., Wang, Y.: Resilient and event-triggered control of stochastic jump systems under deception and denial of service attacks. Int. J. Robust Nonlinear Control 33(3), 1821–1837 (2023)

    Article  MathSciNet  Google Scholar 

  9. Melhem, H., Dayoub, Y.: A hybrid honeypot framework for ddos attacks detection and mitigation

    Google Scholar 

  10. Spitzner, L.: The honeynet project: trapping the hackers. IEEE Sec. Privacy 1(2), 15–23 (2003)

    Article  Google Scholar 

  11. Stumpf, F., Görlach, A., Homann, F., Brückner, L.: Nose-building virtual honeynets made easy. In: Proceedings of the 12th International Linux System Technology Conference, Hamburg, Germany, Citeseer (2005)

    Google Scholar 

  12. Lackner, P.: How to mock a bear: honeypot, honeynet, honeywall & honeytoken: a survey. In: ICEIS (2), pp. 181–188 (2021)

    Google Scholar 

  13. Srinivasa, S., Pedersen, J.M., Vasilomanolakis, E.: Gotta catch’em all: a multistage framework for honeypot fingerprinting, arXiv preprint arXiv:2109.10652

  14. gartner (2019). https://www.gartner.com/peer-insights/search?text=deception

  15. Duan, Q., Al-Shaer, E., Islam, M., Jafarian, H.: Conceal: a strategy composition for resilient cyber deception-framework, metrics and deployment. In: 2018 IEEE Conference on Communications and Network Security (CNS), pp. 1–9. IEEE (2018)

    Google Scholar 

Download references

Acknowledgement

This work was supported by grant number 12R170.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saed Alrabaee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alhosani, N., Alrabaee, S., Faresi, A.A. (2024). An Efficient Strategy for Deploying Deception Technology. In: Perakovic, D., Knapcikova, L. (eds) Future Access Enablers for Ubiquitous and Intelligent Infrastructures. FABULOUS 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 542. Springer, Cham. https://doi.org/10.1007/978-3-031-50051-0_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-50051-0_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-50050-3

  • Online ISBN: 978-3-031-50051-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics