Detailed Information

Cited 6 time in webofscience Cited 8 time in scopus
Metadata Downloads

Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions

Authors
Mohan, Pilla VaishnoDixit, ShriniketGyaneshwar, AmoghChadha, UtkarshSrinivasan, KathiravanSeo, Jung Taek
Issue Date
Mar-2022
Publisher
MDPI
Keywords
Computational intelligence; Deep learning; Defensive deception; Honeypots; Machine-learning; Moving target defense
Citation
Sensors, v.22, no.6, pp.2194 - 2194
Journal Title
Sensors
Volume
22
Number
6
Start Page
2194
End Page
2194
URI
https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/83980
DOI
10.3390/s22062194
ISSN
1424-8220
Abstract
<jats:p>With information systems worldwide being attacked daily, analogies from traditional warfare are apt, and deception tactics have historically proven effective as both a strategy and a technique for Defense. Defensive Deception includes thinking like an attacker and determining the best strategy to counter common attack strategies. Defensive Deception tactics are beneficial at introducing uncertainty for adversaries, increasing their learning costs, and, as a result, lowering the likelihood of successful attacks. In cybersecurity, honeypots and honeytokens and camouflaging and moving target defense commonly employ Defensive Deception tactics. For a variety of purposes, deceptive and anti-deceptive technologies have been created. However, there is a critical need for a broad, comprehensive and quantitative framework that can help us deploy advanced deception technologies. Computational intelligence provides an appropriate set of tools for creating advanced deception frameworks. Computational intelligence comprises two significant families of artificial intelligence technologies: deep learning and machine learning. These strategies can be used in various situations in Defensive Deception technologies. This survey focuses on Defensive Deception tactics deployed using the help of deep learning and machine learning algorithms. Prior work has yielded insights, lessons, and limitations presented in this study. It culminates with a discussion about future directions, which helps address the important gaps in present Defensive Deception research.</jats:p>
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher SEO, JUNGTAEK photo

SEO, JUNGTAEK
College of IT Convergence (컴퓨터공학부(스마트보안전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE