A Survey of Deception Defense: Approaches Used to Counter Malicious Behavior

Haowen Yi,Fan Li,Rui Wang,Ning Hu,Zhihong Tian
DOI: https://doi.org/10.1109/cloudnet59005.2023.10490043
2023-01-01
Abstract:In today’s offensive and defensive game in cyberspace, with the advancement of technology and various technologies, many systems and software used to defend against malicious behavior are constantly being updated and improved, including intrusion detection/prevention systems (IDS/IPS), firewalls and various anti-virus software. Even so, in the face of increasingly capable hackers, relying solely on passive defense is difficult to provide adequate protection, so active defense mechanisms should also be paid attention to and developed. An active defense mechanism that makes an attacker lose the target of his attack or attack the wrong target by deception and baiting is called deception defense. In this survey, we are going to briefly explain the concept of deception defense and discuss some implementations based on deception defense for detecting and defending against malicious behavior.
What problem does this paper attempt to address?