all InfoSec news
A Survey of Network Requirements for Enabling Effective Cyber Deception. (arXiv:2309.00184v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
In the evolving landscape of cybersecurity, the utilization of cyber
deception has gained prominence as a proactive defense strategy against
sophisticated attacks. This paper presents a comprehensive survey that
investigates the crucial network requirements essential for the successful
implementation of effective cyber deception techniques. With a focus on diverse
network architectures and topologies, we delve into the intricate relationship
between network characteristics and the deployment of deception mechanisms.
This survey provides an in-depth analysis of prevailing cyber deception
frameworks, highlighting …
attacks cyber cyber deception cybersecurity deception defense focus implementation network proactive requirements strategy survey techniques