333321

Navigating the Deception Stack: In-Depth Analysis and Application of Comprehensive Cyber Defense Solutions

Article

Last updated: 03 Jan 2025

Subjects

-

Tags

-

Abstract

Deception techniques play a crucial role in enhancing cybersecurity by misleading attackers and safeguarding critical systems. The strategic placement of decoys constructs an elaborate defense architecture that can effectively thwart unauthorized access. This paper presents a comprehensive survey of deception techniques from a research perspective, highlighting their classification, modeling methodologies, and deployment strategies. Additionally, it explores the major research issues associated with these techniques, including the challenge of maintaining the believability of decoys and the ethical implications of their use. Moreover, the paper investigates the role of Moving Target Defense (MTD) in cyber deception, emphasizing its dynamic nature and specifically the network environments. This paper goes beyond theoretical discussions and digs into the implementation details of real frameworks operating at four layers of the deception stack composed of the network, system, software, and data layers. The seamless integration between these layers is essential for creating a convincing deceptive environment. It categorizes these implementations into four main approaches and highlights the corresponding systems that have been developed, thus offering a roadmap for future research and development in this critical field of cybersecurity.

DOI

10.21608/ijicis.2023.247380.1306

Keywords

Cyber Deception, MTD, MITRE, Adversarial techniques, Honeypots

Authors

First Name

Abdelrahman

Last Name

Aly

MiddleName

-

Affiliation

Computer Systems, Faculty of Computer and Information Science, Ain Shams University, Cairo, Egypt

Email

abdlrhmn.ali@cis.asu.edu.eg

City

cairo

Orcid

-

First Name

Mahmoud

Last Name

Fayez

MiddleName

-

Affiliation

Computer Systems Department, Faculty of Computer and Information Science, Ain Shams University, Cairo, Egypt

Email

mahmoud.fayez@cis.asu.edu.eg

City

-

Orcid

0000-0001-8688-9653

First Name

Mirvat

Last Name

Al-Qutt

MiddleName

M

Affiliation

FCIS - Computer System Department.

Email

mmalqutt@cis.asu.edu.eg

City

cairo

Orcid

-

First Name

Ahmed

Last Name

Hamad

MiddleName

-

Affiliation

Faculty of Computer Information Sciences, Ain Shams University, Abbasia, Cairo 11566, Egypt

Email

ahmed.hamad@cis.asu.edu.eg

City

-

Orcid

-

Volume

23

Article Issue

4

Related Issue

45130

Issue Date

2023-12-01

Receive Date

2023-11-08

Publish Date

2023-12-01

Page Start

50

Page End

65

Print ISSN

1687-109X

Online ISSN

2535-1710

Link

https://ijicis.journals.ekb.eg/article_333321.html

Detail API

https://ijicis.journals.ekb.eg/service?article_code=333321

Order

333,321

Type

Original Article

Type Code

494

Publication Type

Journal

Publication Title

International Journal of Intelligent Computing and Information Sciences

Publication Link

https://ijicis.journals.ekb.eg/

MainTitle

Navigating the Deception Stack: In-Depth Analysis and Application of Comprehensive Cyber Defense Solutions

Details

Type

Article

Created At

23 Dec 2024