Network security is often built on perimeter defense. Sophisticated attacks are able to penetrate the perimeter and access valuable resources in the network. A more complete defense strategy also contains mechanisms to detect and mitigate perimeter breaches. Deceptive systems are a promising technology to detect, deceive and counter infiltrations. In this work we provide an insight in the basic mechanisms of deception based cyber defense and discuss in detail one of the most significant drawbacks of the technology: The deployment. We also propose a solution to enable deception systems to a broad range of users. This is achieved by a dynamic deployment strategy based on machine learning to adapt to the network context. Different methods, algorithms and combinations are evaluated to eventually build a full adaptive deployment framework. The proposed framework needs a minimal amount of configuration and maintenance.
CITATION STYLE
Fraunholz, D., Zimmermann, M., & Schotten, H. D. (2017). Towards deployment strategies for deception systems. Advances in Science, Technology and Engineering Systems, 2(3), 1272–1279. https://doi.org/10.25046/aj0203161
Mendeley helps you to discover research relevant for your work.