Three Decades of Deception Techniques in Active Cyber Defense – Retrospect and Outlook

04/08/2021
by   Li Zhang, et al.
0

Deception techniques have been widely seen as a game changer in cyber defense. In this paper, we review representative techniques in honeypots, honeytokens, and moving target defense, spanning from the late 1980s to the year 2021. Techniques from these three domains complement with each other and may be leveraged to build a holistic deception based defense. However, to the best of our knowledge, there has not been a work that provides a systematic retrospect of these three domains all together and investigates their integrated usage for orchestrated deceptions. Our paper aims to fill this gap. By utilizing a tailored cyber kill chain model which can reflect the current threat landscape and a four-layer deception stack, a two-dimensional taxonomy is developed, based on which the deception techniques are classified. The taxonomy literally answers which phases of a cyber attack campaign the techniques can disrupt and which layers of the deception stack they belong to. Cyber defenders may use the taxonomy as a reference to design an organized and comprehensive deception plan, or to prioritize deception efforts for a budget conscious solution. We also discuss two important points for achieving active and resilient cyber defense, namely deception in depth and deception lifecycle, where several notable proposals are illustrated. Finally, some outlooks on future research directions are presented, including dynamic integration of different deception techniques, quantified deception effects and deception operation cost, hardware-supported deception techniques, as well as techniques developed based on better understanding of the human element.

READ FULL TEXT
research
07/28/2020

Cyber Deception for Computer and Network Security: Survey and Challenges

Cyber deception has recently received increasing attentions as a promisi...
research
03/01/2023

DOLOS: A Novel Architecture for Moving Target Defense

Moving Target Defense and Cyber Deception emerged in recent years as two...
research
08/01/2021

Cybonto: Towards Human Cognitive Digital Twins for Cybersecurity

Cyber defense is reactive and slow. On average, the time-to-remedy is hu...
research
12/14/2017

A Game-Theoretic Taxonomy and Survey of Defensive Deception for Cybersecurity and Privacy

Cyber attacks on both databases and critical infrastructure have threate...
research
06/22/2023

Impacts and Risk of Generative AI Technology on Cyber Defense

Generative Artificial Intelligence (GenAI) has emerged as a powerful tec...
research
09/01/2023

A Survey of Network Requirements for Enabling Effective Cyber Deception

In the evolving landscape of cybersecurity, the utilization of cyber dec...
research
10/04/2021

Realizing Forward Defense in the Cyber Domain

With the recognition of cyberspace as an operating domain, concerted eff...

Please sign up or login with your details

Forgot password? Click here to reset