April 22, 2024, 4:10 a.m. | Marco Zambianco, Claudio Facchinetti, Domenico Siracusa

cs.CR updates on arXiv.org arxiv.org

arXiv:2404.12783v1 Announce Type: new
Abstract: Cyber deception allows compensating the late response of defenders countermeasures to the ever evolving tactics, techniques, and procedures (TTPs) of attackers. This proactive defense strategy employs decoys resembling legitimate system components to lure stealthy attackers within the defender environment, slowing and/or denying the accomplishment of their goals. In this regard, the selection of decoys that can expose the techniques used by malicious users plays a central role to incentivize their engagement. However, this is a …

arxiv att attackers components countermeasures cs.cr cyber cyber deception deception decoy decoys defender defenders defense environment mitre mitre att&ck proactive proactive defense procedures response strategy system tactics techniques ttps

Security Specialist

@ Nestlé | St. Louis, MO, US, 63164

Cybersecurity Analyst

@ Dana Incorporated | Pune, MH, IN, 411057

Sr. Application Security Engineer

@ CyberCube | United States

Linux DevSecOps Administrator (Remote)

@ Accenture Federal Services | Arlington, VA

Cyber Security Intern or Co-op

@ Langan | Parsippany, NJ, US, 07054-2172

Security Advocate - Application Security

@ Datadog | New York, USA, Remote