O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo
{"title":"基于欺骗的入侵检测系统的前沿趋势综述","authors":"O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo","doi":"10.4236/jis.2021.124014","DOIUrl":null,"url":null,"abstract":"Cyber criminals have become a formidable treat in \ntoday’s world. This present reality has placed cloud computing platforms under \nconstant treats of cyber-attacks at all levels, with an ever-evolving treat \nlandscape. It has been observed that the number of threats faced in cloud \ncomputing is rising exponentially mainly due to its widespread adoption, rapid \nexpansion and a vast attack surface. One of the front-line tools employed in \ndefense against cyber-attacks is the Intrusion Detection Systems (IDSs). In \nrecent times, an increasing number of researchers and cyber security practitioners \nalike have advocated the use of deception-based techniques in IDS and other \ncyber security defenses as against the use of traditional methods. This paper \npresents an extensive overview of the deception technology environment, as well \nas a review of current trends and implementation models in deception-based \nIntrusion Detection Systems. Issues mitigating the implementation of deception \nbased cyber security defenses are also investigated.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey\",\"authors\":\"O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo\",\"doi\":\"10.4236/jis.2021.124014\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cyber criminals have become a formidable treat in \\ntoday’s world. This present reality has placed cloud computing platforms under \\nconstant treats of cyber-attacks at all levels, with an ever-evolving treat \\nlandscape. It has been observed that the number of threats faced in cloud \\ncomputing is rising exponentially mainly due to its widespread adoption, rapid \\nexpansion and a vast attack surface. One of the front-line tools employed in \\ndefense against cyber-attacks is the Intrusion Detection Systems (IDSs). In \\nrecent times, an increasing number of researchers and cyber security practitioners \\nalike have advocated the use of deception-based techniques in IDS and other \\ncyber security defenses as against the use of traditional methods. This paper \\npresents an extensive overview of the deception technology environment, as well \\nas a review of current trends and implementation models in deception-based \\nIntrusion Detection Systems. Issues mitigating the implementation of deception \\nbased cyber security defenses are also investigated.\",\"PeriodicalId\":57259,\"journal\":{\"name\":\"信息安全(英文)\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-09-09\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"信息安全(英文)\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.4236/jis.2021.124014\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"信息安全(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.4236/jis.2021.124014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey
Cyber criminals have become a formidable treat in
today’s world. This present reality has placed cloud computing platforms under
constant treats of cyber-attacks at all levels, with an ever-evolving treat
landscape. It has been observed that the number of threats faced in cloud
computing is rising exponentially mainly due to its widespread adoption, rapid
expansion and a vast attack surface. One of the front-line tools employed in
defense against cyber-attacks is the Intrusion Detection Systems (IDSs). In
recent times, an increasing number of researchers and cyber security practitioners
alike have advocated the use of deception-based techniques in IDS and other
cyber security defenses as against the use of traditional methods. This paper
presents an extensive overview of the deception technology environment, as well
as a review of current trends and implementation models in deception-based
Intrusion Detection Systems. Issues mitigating the implementation of deception
based cyber security defenses are also investigated.