首页> 外文期刊>Computers & Security >Three decades of deception techniques in active cyber defense - Retrospect and outlook
【24h】

Three decades of deception techniques in active cyber defense - Retrospect and outlook

机译:主动网络防御中的三十年欺骗技术 - 回顾和前景

获取原文
获取原文并翻译 | 示例
       

摘要

Deception techniques have been widely seen as a game changer in cyber defense. In this paper, we review representative techniques in honeypots, honeytokens, and moving target defense, spanning from the late 1980s to the year 2021. Techniques from these three domains complement with each other and may be leveraged to build a holistic deception based defense. However, to the best of our knowledge, there has not been a work that provides a systematic retrospect of these three domains all together and investigates their integrated usage for orchestrated deceptions. Our paper aims to fill this gap. By utilizing a tailored cyber kill chain model which can reflect the current threat landscape and a four-layer deception stack, a two-dimensional taxonomy is developed, based on which the deception techniques are classified. The taxonomy literally answers which phases of a cyber attack campaign the techniques can disrupt and which layers of the deception stack they belong to. Cyber defenders may use the taxonomy as a reference to design an organized and comprehensive deception plan, or to prioritize deception efforts for a budget conscious solution. We also discuss two important points for achieving active and resilient cyber defense, namely deception in depth and deception lifecycle, where several notable proposals are illustrated. Finally, some outlooks on future research directions are presented, including dynamic integration of different deception techniques, quantified deception effects and deception operation cost, hardware-supported deception techniques, as well as techniques developed based on better understanding of the human element.
机译:欺骗技术已被广泛被视为网络防御中的游戏更换器。在本文中,我们在20世纪80年代后期到2021年,从20世纪80年代后期到2011年,审查代表性技术。从2021年到2011年。这三个领域的技术相互补充,并且可以利用以建立基于整体欺骗的防御。然而,据我们所知,还没有一项工作,可以在一起提供这三个域的系统回顾,并调查了策划欺骗的综合使用情况。我们的论文旨在填补这个差距。通过利用可以反映当前威胁景观和四层欺骗堆的量身定制的网络杀灭链模型,开发了一种二维分类,基于欺骗技术被分类。分类学字面意思是答案的网络攻击活动的阶段这些技术可能会破坏,它们所属的欺骗堆栈的层数。网络防守者可以使用分类物作为参考设计有组织和综合欺骗计划,或优先考虑预算意识解决方案的欺骗工作。我们还讨论了实现积极和有弹性网络防御的两个重要观点,即深度和欺骗生命周期的欺骗,其中说明了几个显着的提案。最后,提出了一些关于未来研究方向的前景,包括不同欺骗技术的动态集成,量化欺骗效应和欺骗性运营成本,硬件支持的欺骗技术,以及基于更好地理解人类元素的技术开发的技术。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号