Honeypot Deception Tactics

10Citations
Citations of this article
24Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Honeypots on computer networks are most effective when they use deception to fool cyberadversaries into thinking that they are not actual decoy intelligence collectors. Honeypot deception can be made more effective when applied with variety. We discuss the range of deception tactics of which honeypots can take advantage. Ideas can come from deception theory, and honeypot deceptions can benefit from planning and experimentation.

Cite

CITATION STYLE

APA

Rowe, N. C. (2019). Honeypot Deception Tactics. In Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings (pp. 35–45). Springer International Publishing. https://doi.org/10.1007/978-3-030-02110-8_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free