About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 7th EAI International Conference, FABULOUS 2023, Bratislava, Slovakia, October 24–26, 2023, Proceedings

Research Article

An Efficient Strategy for Deploying Deception Technology

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-50051-0_13,
        author={Noora Alhosani and Saed Alrabaee and Ahmed Al Faresi},
        title={An Efficient Strategy for Deploying Deception Technology},
        proceedings={Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 7th EAI International Conference, FABULOUS 2023, Bratislava, Slovakia, October 24--26, 2023, Proceedings},
        proceedings_a={FABULOUS},
        year={2023},
        month={12},
        keywords={Deception Deception attributes Network Attacks intrusion detection system},
        doi={10.1007/978-3-031-50051-0_13}
    }
    
  • Noora Alhosani
    Saed Alrabaee
    Ahmed Al Faresi
    Year: 2023
    An Efficient Strategy for Deploying Deception Technology
    FABULOUS
    Springer
    DOI: 10.1007/978-3-031-50051-0_13
Noora Alhosani1, Saed Alrabaee1,*, Ahmed Al Faresi1
  • 1: Department of Information Systems and Security, CIT
*Contact email: salrabaee@uaeu.ac.ae

Abstract

This article introduces a methodology for maximizing the effectiveness of deception technology in detecting sophisticated cyber attacks and overcoming the limitation of intrusion detection systems’ ability. The proposed methods implement multi-layered deception techniques at different network, system, and application levels to enhance coverage and improve attack detection by using decoys that mimic real systems to attract and identify potential attackers. The method proposes dynamic adaptation to changes in the network environment and employs obfuscation to maintain the effectiveness of the proposed techniques. Implementing this method can provide organizations with an early warning system to respond quickly and mitigate potential damage from cyber attacks, and we shall prove that by performing multiple cyber attacks towards a network with an intrusion detection system and decoys, then compare the detection capability on both technologies.

Keywords
Deception Deception attributes Network Attacks intrusion detection system
Published
2023-12-15
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-50051-0_13
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL