Navigating the Deception Stack: In-Depth Analysis and Application of Comprehensive Cyber Defense Solutions | ||||
International Journal of Intelligent Computing and Information Sciences | ||||
Volume 23, Issue 4, December 2023, Page 50-65 PDF (314.69 K) | ||||
Document Type: Original Article | ||||
DOI: 10.21608/ijicis.2023.247380.1306 | ||||
![]() | ||||
Authors | ||||
Abdelrahman Aly ![]() ![]() | ||||
1Computer Systems, Faculty of Computer and Information Science, Ain Shams University, Cairo, Egypt | ||||
2Computer Systems Department, Faculty of Computer and Information Science, Ain Shams University, Cairo, Egypt | ||||
3FCIS - Computer System Department. | ||||
4Faculty of Computer Information Sciences, Ain Shams University, Abbasia, Cairo 11566, Egypt | ||||
Abstract | ||||
Deception techniques play a crucial role in enhancing cybersecurity by misleading attackers and safeguarding critical systems. The strategic placement of decoys constructs an elaborate defense architecture that can effectively thwart unauthorized access. This paper presents a comprehensive survey of deception techniques from a research perspective, highlighting their classification, modeling methodologies, and deployment strategies. Additionally, it explores the major research issues associated with these techniques, including the challenge of maintaining the believability of decoys and the ethical implications of their use. Moreover, the paper investigates the role of Moving Target Defense (MTD) in cyber deception, emphasizing its dynamic nature and specifically the network environments. This paper goes beyond theoretical discussions and digs into the implementation details of real frameworks operating at four layers of the deception stack composed of the network, system, software, and data layers. The seamless integration between these layers is essential for creating a convincing deceptive environment. It categorizes these implementations into four main approaches and highlights the corresponding systems that have been developed, thus offering a roadmap for future research and development in this critical field of cybersecurity. | ||||
Keywords | ||||
Cyber Deception; MTD; MITRE; Adversarial techniques; Honeypots | ||||
Statistics Article View: 210 PDF Download: 407 |
||||