Cyber Security Deception

@inproceedings{Almeshekah2016CyberSD,
  title={Cyber Security Deception},
  author={Mohammed H. Almeshekah and Eugene H. Spafford},
  booktitle={Cyber Deception},
  year={2016}
}
Our physical and digital worlds are converging at a rapid pace, putting a lot of our valuable information in digital formats. Currently, most computer systems’ predictable responses provide attackers with valuable information on how to infiltrate them. In this chapter, we discuss how the use of deception can play a prominent role in enhancing the security of current computer systems. We show how deceptive techniques have been used in many successful computer breaches. Phishing, social… CONTINUE READING

Figures, Tables, and Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 16 CITATIONS

References

Publications referenced by this paper.
SHOWING 1-10 OF 53 REFERENCES

Almeshekah, Using Deception to Enhance Security: A Taxonomy, Model and Novel Uses

M H.
  • PhD thesis, Purdue University,
  • 2015
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Honeywords: making password-cracking detectable

  • ACM Conference on Computer and Communications Security
  • 2013
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware

  • 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN)
  • 2008
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Counterdeception Principles and Applications for National Security

Edward Waltz, Michael Bennett
  • 2007
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

Robust defenses for cross-site request forgery

  • ACM Conference on Computer and Communications Security
  • 2008
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Active Cyber Network Defense with Denial and Deception.

K. Heckman
  • http://goo.gl/ Typwi4,
  • 2013
VIEW 2 EXCERPTS