Detailed Information

Cited 6 time in webofscience Cited 8 time in scopus
Metadata Downloads

Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions

Full metadata record
DC Field Value Language
dc.contributor.authorMohan, Pilla Vaishno-
dc.contributor.authorDixit, Shriniket-
dc.contributor.authorGyaneshwar, Amogh-
dc.contributor.authorChadha, Utkarsh-
dc.contributor.authorSrinivasan, Kathiravan-
dc.contributor.authorSeo, Jung Taek-
dc.date.accessioned2022-04-16T02:40:08Z-
dc.date.available2022-04-16T02:40:08Z-
dc.date.created2022-03-15-
dc.date.issued2022-03-
dc.identifier.issn1424-8220-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/83980-
dc.description.abstract<jats:p>With information systems worldwide being attacked daily, analogies from traditional warfare are apt, and deception tactics have historically proven effective as both a strategy and a technique for Defense. Defensive Deception includes thinking like an attacker and determining the best strategy to counter common attack strategies. Defensive Deception tactics are beneficial at introducing uncertainty for adversaries, increasing their learning costs, and, as a result, lowering the likelihood of successful attacks. In cybersecurity, honeypots and honeytokens and camouflaging and moving target defense commonly employ Defensive Deception tactics. For a variety of purposes, deceptive and anti-deceptive technologies have been created. However, there is a critical need for a broad, comprehensive and quantitative framework that can help us deploy advanced deception technologies. Computational intelligence provides an appropriate set of tools for creating advanced deception frameworks. Computational intelligence comprises two significant families of artificial intelligence technologies: deep learning and machine learning. These strategies can be used in various situations in Defensive Deception technologies. This survey focuses on Defensive Deception tactics deployed using the help of deep learning and machine learning algorithms. Prior work has yielded insights, lessons, and limitations presented in this study. It culminates with a discussion about future directions, which helps address the important gaps in present Defensive Deception research.</jats:p>-
dc.language영어-
dc.language.isoen-
dc.publisherMDPI-
dc.relation.isPartOfSensors-
dc.titleLeveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000774397400001-
dc.identifier.doi10.3390/s22062194-
dc.identifier.bibliographicCitationSensors, v.22, no.6, pp.2194 - 2194-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85126054516-
dc.citation.endPage2194-
dc.citation.startPage2194-
dc.citation.titleSensors-
dc.citation.volume22-
dc.citation.number6-
dc.contributor.affiliatedAuthorSeo, Jung Taek-
dc.type.docTypeArticle-
dc.subject.keywordAuthorComputational intelligence-
dc.subject.keywordAuthorDeep learning-
dc.subject.keywordAuthorDefensive deception-
dc.subject.keywordAuthorHoneypots-
dc.subject.keywordAuthorMachine-learning-
dc.subject.keywordAuthorMoving target defense-
dc.subject.keywordPlusARTIFICIAL-INTELLIGENCE-
dc.subject.keywordPlusCYBER SECURITY-
dc.subject.keywordPlusMACHINE-
dc.subject.keywordPlusGAME-
dc.subject.keywordPlusSTEGANOGRAPHY-
dc.subject.keywordPlusOPTIMIZATION-
dc.subject.keywordPlusTECHNOLOGY-
dc.subject.keywordPlusMTD-
dc.relation.journalResearchAreaChemistry-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaInstruments & Instrumentation-
dc.relation.journalWebOfScienceCategoryChemistry, Analytical-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryInstruments & Instrumentation-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher SEO, JUNGTAEK photo

SEO, JUNGTAEK
College of IT Convergence (컴퓨터공학부(스마트보안전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE