Cyber Deception: State of the art, Trends and Open challenges

Pedro Beltrán López, Manuel Gil Pérez, Pantaleone Nespoli
{"title":"Cyber Deception: State of the art, Trends and Open challenges","authors":"Pedro Beltrán López, Manuel Gil Pérez, Pantaleone Nespoli","doi":"arxiv-2409.07194","DOIUrl":null,"url":null,"abstract":"The growing interest in cybersecurity has significantly increased articles\ndesigning and implementing various Cyber Deception (CYDEC) mechanisms. This\ntrend reflects the urgent need for new strategies to address cyber threats\neffectively. Since its emergence, CYDEC has established itself as an innovative\ndefense against attackers, thanks to its proactive and reactive capabilities,\nfinding applications in numerous real-life scenarios. Despite the considerable\nwork devoted to CYDEC, the literature still presents significant gaps. In\nparticular, there has not been (i) a comprehensive analysis of the main\ncomponents characterizing CYDEC, (ii) a generic classification covering all\ntypes of solutions, nor (iii) a survey of the current state of the literature\nin various contexts. This article aims to fill these gaps through a detailed\nreview of the main features that comprise CYDEC, developing a comprehensive\nclassification taxonomy. In addition, the different frameworks used to generate\nCYDEC are reviewed, presenting a more comprehensive one. Existing solutions in\nthe literature using CYDEC, both without Artificial Intelligence (AI) and with\nAI, are studied and compared. Finally, the most salient trends of the current\nstate of the art are discussed, offering a list of pending challenges for\nfuture research.","PeriodicalId":501332,"journal":{"name":"arXiv - CS - Cryptography and Security","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Cryptography and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.07194","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The growing interest in cybersecurity has significantly increased articles designing and implementing various Cyber Deception (CYDEC) mechanisms. This trend reflects the urgent need for new strategies to address cyber threats effectively. Since its emergence, CYDEC has established itself as an innovative defense against attackers, thanks to its proactive and reactive capabilities, finding applications in numerous real-life scenarios. Despite the considerable work devoted to CYDEC, the literature still presents significant gaps. In particular, there has not been (i) a comprehensive analysis of the main components characterizing CYDEC, (ii) a generic classification covering all types of solutions, nor (iii) a survey of the current state of the literature in various contexts. This article aims to fill these gaps through a detailed review of the main features that comprise CYDEC, developing a comprehensive classification taxonomy. In addition, the different frameworks used to generate CYDEC are reviewed, presenting a more comprehensive one. Existing solutions in the literature using CYDEC, both without Artificial Intelligence (AI) and with AI, are studied and compared. Finally, the most salient trends of the current state of the art are discussed, offering a list of pending challenges for future research.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络欺骗:技术现状、趋势和公开挑战
人们对网络安全的兴趣与日俱增,设计和实施各种网络欺骗(CYDEC)机制的文章也大幅增加。这一趋势反映了人们迫切需要新的战略来有效地应对网络威胁。自出现以来,网络欺骗(CYDEC)凭借其主动和被动的能力,已成为抵御攻击者的创新防御手段,并在众多现实生活场景中得到应用。尽管在 CYDEC 方面做了大量工作,但相关文献仍存在很大差距。尤其是:(i) 对 CYDEC 主要特征的全面分析;(ii) 涵盖所有类型解决方案的通用分类;(iii) 不同背景下文献现状的调查。本文旨在通过详细审查 CYDEC 的主要特征,制定一个全面的分类标准,从而填补这些空白。此外,本文还对用于生成 CYDEC 的不同框架进行了回顾,从而提出了一个更为全面的框架。研究并比较了文献中使用 CYDEC 的现有解决方案,包括无人工智能(AI)和有人工智能的解决方案。最后,讨论了当前技术最突出的趋势,并提出了未来研究面临的挑战清单。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
PAD-FT: A Lightweight Defense for Backdoor Attacks via Data Purification and Fine-Tuning Artemis: Efficient Commit-and-Prove SNARKs for zkML A Survey-Based Quantitative Analysis of Stress Factors and Their Impacts Among Cybersecurity Professionals Log2graphs: An Unsupervised Framework for Log Anomaly Detection with Efficient Feature Extraction Practical Investigation on the Distinguishability of Longa's Atomic Patterns
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1