Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey

  • Oluoha O
  • Yange T
  • Okereke G
  • et al.
N/ACitations
Citations of this article
44Readers
Mendeley users who have this article in their library.

Abstract

Cyber criminals have become a formidable treat in today’s world. This present reality has placed cloud computing platforms under constant treats of cyber-attacks at all levels, with an ever-evolving treat landscape. It has been observed that the number of threats faced in cloud computing is rising exponentially mainly due to its widespread adoption, rapid expansion and a vast attack surface. One of the front-line tools employed in defense against cyber-attacks is the Intrusion Detection Systems (IDSs). In recent times, an increasing number of researchers and cyber security practitioners alike have advocated the use of deception-based techniques in IDS and other cyber security defenses as against the use of traditional methods. This paper presents an extensive overview of the deception technology environment, as well as a review of current trends and implementation models in deception-based Intrusion Detection Systems. Issues mitigating the implementation of deception based cyber security defenses are also investigated.

Cite

CITATION STYLE

APA

Oluoha, O. U., Yange, T. S., Okereke, G. E., & Bakpo, F. S. (2021). Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey. Journal of Information Security, 12(04), 250–269. https://doi.org/10.4236/jis.2021.124014

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free