Leveraging Computational Intelligence Techniques for Defensive Deception: A Review, Recent Advances, Open Problems and Future Directions
- Authors
- Mohan, Pilla Vaishno; Dixit, Shriniket; Gyaneshwar, Amogh; Chadha, Utkarsh; Srinivasan, Kathiravan; Seo, Jung Taek
- Issue Date
- Mar-2022
- Publisher
- MDPI
- Keywords
- Computational intelligence; Deep learning; Defensive deception; Honeypots; Machine-learning; Moving target defense
- Citation
- Sensors, v.22, no.6, pp.2194 - 2194
- Journal Title
- Sensors
- Volume
- 22
- Number
- 6
- Start Page
- 2194
- End Page
- 2194
- URI
- https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/83980
- DOI
- 10.3390/s22062194
- ISSN
- 1424-8220
- Abstract
- <jats:p>With information systems worldwide being attacked daily, analogies from traditional warfare are apt, and deception tactics have historically proven effective as both a strategy and a technique for Defense. Defensive Deception includes thinking like an attacker and determining the best strategy to counter common attack strategies. Defensive Deception tactics are beneficial at introducing uncertainty for adversaries, increasing their learning costs, and, as a result, lowering the likelihood of successful attacks. In cybersecurity, honeypots and honeytokens and camouflaging and moving target defense commonly employ Defensive Deception tactics. For a variety of purposes, deceptive and anti-deceptive technologies have been created. However, there is a critical need for a broad, comprehensive and quantitative framework that can help us deploy advanced deception technologies. Computational intelligence provides an appropriate set of tools for creating advanced deception frameworks. Computational intelligence comprises two significant families of artificial intelligence technologies: deep learning and machine learning. These strategies can be used in various situations in Defensive Deception technologies. This survey focuses on Defensive Deception tactics deployed using the help of deep learning and machine learning algorithms. Prior work has yielded insights, lessons, and limitations presented in this study. It culminates with a discussion about future directions, which helps address the important gaps in present Defensive Deception research.</jats:p>
- Files in This Item
- There are no files associated with this item.
- Appears in
Collections - IT융합대학 > 컴퓨터공학과 > 1. Journal Articles
![qrcode](https://api.qrserver.com/v1/create-qr-code/?size=55x55&data=https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/83980)
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.