April 22, 2024, 4:10 a.m. | Marco Zambianco, Claudio Facchinetti, Domenico Siracusa

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.12783v1 Announce Type: new
Abstract: Cyber deception allows compensating the late response of defenders countermeasures to the ever evolving tactics, techniques, and procedures (TTPs) of attackers. This proactive defense strategy employs decoys resembling legitimate system components to lure stealthy attackers within the defender environment, slowing and/or denying the accomplishment of their goals. In this regard, the selection of decoys that can expose the techniques used by malicious users plays a central role to incentivize their engagement. However, this is a …

arxiv att attackers components countermeasures cs.cr cyber cyber deception deception decoy decoys defender defenders defense environment mitre mitre att&ck proactive proactive defense procedures response strategy system tactics techniques ttps

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior - Penetration Tester

@ Deloitte | Madrid, España

Associate Cyber Incident Responder

@ Highmark Health | PA, Working at Home - Pennsylvania

Senior Insider Threat Analyst

@ IT Concepts Inc. | Woodlawn, Maryland, United States