Jan. 26, 2023, 2:10 a.m. | Daniel Reti, Karina Elzer, Daniel Fraunholz, Daniel Schneider, Hans-Dieter Schotten

cs.CR updates on arXiv.org arxiv.org

In the field of network security, with the ongoing arms race between
attackers, seeking new vulnerabilities to bypass defense mechanisms and
defenders reinforcing their prevention, detection and response strategies, the
novel concept of cyber deception has emerged. Starting from the well-known
example of honeypots, many other deception strategies have been developed such
as honeytokens and moving target defense, all sharing the objective of creating
uncertainty for attackers and increasing the chance for the attacker of making
mistakes. In this paper …

arms attack attackers attack simulation bypass concept cyber cyber deception deception defenders defense detection detection and response honeypots honeytokens moving moving target defense network network security novel prevention response security sharing simulation target uncertainty vulnerabilities well-known

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC