A comprehensive survey on cyber deception techniques to improve honeypot performance
Honeypot technologies are becoming increasingly popular in cybersecurity as they offer valuable insights into adversary behavior with a low rate of false detections. By diverting the attention of potential attackers and siphoning off their resources, honeypots are a powerful tool for protecting crit...
Saved in:
Published in | Computers & security Vol. 140; p. 103792 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.05.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Honeypot technologies are becoming increasingly popular in cybersecurity as they offer valuable insights into adversary behavior with a low rate of false detections. By diverting the attention of potential attackers and siphoning off their resources, honeypots are a powerful tool for protecting critical assets within a network. However, the cybersecurity landscape constantly evolves, and professional attackers are always working to uncover and bypass honeypots. Once an adversary successfully identifies a deception mechanism in place, they may change their tactics, potentially causing significant harm to the network. Maintaining a high level of deception is crucial for honeypots to remain undetectable. This paper explores various deception techniques designed specifically for honeypots to enhance their performance while making them impervious to detection. Previous research has not provided a detailed comparison of these techniques, particularly those tailored to honeynets. Therefore, we categorize the presented techniques into relevant classes, subject them to a comparative analysis, and evaluate their effectiveness in simulation scenarios. We also present a mathematical model that comprehensively represents and compares various honeynet research endeavors. In addition, we provide insightful suggestions that highlight the existing research gaps in this field and offer a roadmap for future expansion. This includes extending deception techniques to emulate vulnerabilities inherent in 5G and software-defined networks, which address the evolving challenges of the cybersecurity landscape. The findings and insights presented in this paper are valuable to honeypot developers and cybersecurity researchers alike, providing a vital resource for advancing the field and fortifying network defenses against ever-evolving threats. |
---|---|
AbstractList | Honeypot technologies are becoming increasingly popular in cybersecurity as they offer valuable insights into adversary behavior with a low rate of false detections. By diverting the attention of potential attackers and siphoning off their resources, honeypots are a powerful tool for protecting critical assets within a network. However, the cybersecurity landscape constantly evolves, and professional attackers are always working to uncover and bypass honeypots. Once an adversary successfully identifies a deception mechanism in place, they may change their tactics, potentially causing significant harm to the network. Maintaining a high level of deception is crucial for honeypots to remain undetectable. This paper explores various deception techniques designed specifically for honeypots to enhance their performance while making them impervious to detection. Previous research has not provided a detailed comparison of these techniques, particularly those tailored to honeynets. Therefore, we categorize the presented techniques into relevant classes, subject them to a comparative analysis, and evaluate their effectiveness in simulation scenarios. We also present a mathematical model that comprehensively represents and compares various honeynet research endeavors. In addition, we provide insightful suggestions that highlight the existing research gaps in this field and offer a roadmap for future expansion. This includes extending deception techniques to emulate vulnerabilities inherent in 5G and software-defined networks, which address the evolving challenges of the cybersecurity landscape. The findings and insights presented in this paper are valuable to honeypot developers and cybersecurity researchers alike, providing a vital resource for advancing the field and fortifying network defenses against ever-evolving threats. |
ArticleNumber | 103792 |
Author | Ja'fari, Forough Javadpour, Amir Shojafar, Mohammad Taleb, Tarik Benzaïd, Chafika |
Author_xml | – sequence: 1 givenname: Amir surname: Javadpour fullname: Javadpour, Amir email: a.javadpour87@gmail.com organization: ICTFICIAL Oy, Espoo, Finland – sequence: 2 givenname: Forough surname: Ja'fari fullname: Ja'fari, Forough email: azadeh.mth@gmail.com organization: Department of Computer Engineering, Yazd University, Safaeih, Yazd, 100190, Iran – sequence: 3 givenname: Tarik surname: Taleb fullname: Taleb, Tarik email: tarik.taleb@rub.de organization: Faculty of Electrical Engineering and Information Technology, Ruhr University Bochum, Bochum, Germany – sequence: 4 givenname: Mohammad surname: Shojafar fullname: Shojafar, Mohammad email: m.shojafar@surrey.ac.uk organization: 5G/6GIC, Institute for Communication Systems (ICS), University of Surrey, Guildford, GU27XH, United Kingdom – sequence: 5 givenname: Chafika surname: Benzaïd fullname: Benzaïd, Chafika email: chafika.benzaid@oulu.fi organization: Faculty of Information Technology and Electrical Engineering, University of Oulu, Finland |
BookMark | eNp9kEFrAjEQhUOxULX9Az3lD6xNstndCL2ItLUg9GLPIclOMKKbbRKF_ffNYk89eBpmeN_w3puhSec7QOiZkgUltH45LIyPsGCE8XwomyW7Q1MqGlbUjIgJmmZRU3DCxQOaxXgghDa1EFO0W2HjT32APXTRXQDHc7jAgH2HzaAh4BYM9MnlPYHZd-7nDBEnj12GfNbvs5Gh9wn3EKwPJ9UZeET3Vh0jPP3NOfp-f9utN8X26-NzvdoWpuQ8FVbzipqK10qQypZly4lRUNfEasW0VpUWutGa86ayZNlWxFIOLWGGqBKA8XKOxPWvCT7GAFYal9RoNgXljpISObYjD3JsR47tyGs7GWX_0D64kwrDbej1CkEOdXEQZDQOcuDWBTBJtt7dwn8BPTeC1w |
CitedBy_id | crossref_primary_10_3390_s25051382 crossref_primary_10_1016_j_cose_2024_104032 crossref_primary_10_1111_coin_70020 crossref_primary_10_1007_s44196_025_00741_7 crossref_primary_10_1109_JIOT_2024_3450192 crossref_primary_10_1016_j_cose_2024_103981 crossref_primary_10_1038_s41598_025_93138_7 crossref_primary_10_34248_bsengineering_1531420 crossref_primary_10_4236_jis_2024_153019 crossref_primary_10_1109_ACCESS_2024_3525064 crossref_primary_10_1109_ACCESS_2024_3443142 crossref_primary_10_1007_s10207_025_01011_5 crossref_primary_10_1016_j_jnca_2024_103918 crossref_primary_10_1016_j_knosys_2024_112732 crossref_primary_10_1007_s00607_024_01360_4 crossref_primary_10_1007_s11334_024_00594_x |
Cites_doi | 10.1016/j.future.2020.08.021 10.1109/TSG.2017.2670144 10.1016/j.comnet.2023.109776 10.1016/j.rineng.2022.100576 10.1016/j.cose.2023.103268 10.1145/3337772 10.1080/01402398208437106 10.1109/MNET.011.2000088 10.3390/s22208046 10.1109/TDSC.2015.2406707 10.1016/j.cose.2021.102598 10.1016/j.future.2022.11.008 10.1007/s10586-022-03621-3 10.4304/jcp.2.2.25-36 10.3390/electronics9030415 10.1155/2023/8981988 10.1007/s12652-020-02461-6 10.1145/3582077 10.1109/JSAC.2019.2894307 10.1016/j.cosrev.2023.100600 10.1007/s13278-014-0221-5 10.1016/j.cose.2020.101761 10.1016/j.cose.2020.101870 10.3390/sym13040597 10.1016/j.eswa.2022.117073 10.1016/j.destud.2009.07.002 10.1016/j.ins.2023.119530 10.1145/2854152 10.30630/joiv.6.1.853 10.1016/j.cose.2021.102288 10.3390/s22062194 10.1007/s11227-021-03871-9 10.1109/ACCESS.2022.3210117 10.1145/3545574 10.1002/sec.242 10.1016/j.comcom.2009.03.005 10.1109/TNSM.2022.3179965 10.20533/jitst.2046.3723.2015.0047 10.1007/s11277-019-06176-6 10.1109/TNSM.2023.3254581 10.1038/s41598-023-28613-0 10.1007/s11227-019-03005-2 10.1016/j.cose.2022.102892 10.1109/COMST.2021.3102874 10.1109/TIFS.2022.3220939 10.1109/MC.2017.201 10.1109/JSYST.2017.2762161 10.1007/s10207-017-0361-5 10.1007/s10586-022-03629-9 10.1109/TDSC.2007.1002 10.1007/s11277-019-06773-5 10.3390/fi15040127 10.1109/TIFS.2018.2886472 10.1109/MNET.104.2100495 10.1109/TNSM.2017.2724239 10.36548/jscp.2023.3.002 10.1016/j.compeleceng.2022.108212 10.3390/jcp2010010 10.1145/3214305 10.1109/TETCI.2020.3023447 10.3390/math11010249 10.1109/JIOT.2016.2547994 10.1073/pnas.1412810111 10.1049/iet-ifs.2015.0256 10.1016/j.procs.2015.05.370 10.3390/s23084060 10.1016/j.jss.2018.03.031 |
ContentType | Journal Article |
Copyright | 2024 The Author(s) |
Copyright_xml | – notice: 2024 The Author(s) |
DBID | 6I. AAFTH AAYXX CITATION |
DOI | 10.1016/j.cose.2024.103792 |
DatabaseName | ScienceDirect Open Access Titles Elsevier:ScienceDirect:Open Access CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1872-6208 |
ExternalDocumentID | 10_1016_j_cose_2024_103792 S0167404824000932 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1RT 1~. 1~5 29F 4.4 457 4G. 5GY 5VS 6I. 7-5 71M 8P~ 9JN AACTN AAEDT AAEDW AAFTH AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN ABBOA ABFSI ABMAC ABXDB ABYKQ ACDAQ ACGFO ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV AKRWK ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA GBOLZ HLX HLZ HVGLF HZ~ IHE J1W KOM LG8 LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SBM SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ WH7 WUQ XJE XPP XSW YK3 ZMT ~G- AATTM AAXKI AAYWO AAYXX ABJNI ABWVN ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AFXIZ AGCQF AGQPQ AGRNS AIGII AIIUN AKBMS AKYEP ANKPU APXCP BNPGV CITATION SSH |
ID | FETCH-LOGICAL-c344t-fb451c546a805f33d40cae660fba2bba5b8b7bb4475f09d50f14ed02c0a3ee243 |
IEDL.DBID | .~1 |
ISSN | 0167-4048 |
IngestDate | Tue Jul 01 03:48:25 EDT 2025 Thu Apr 24 23:03:43 EDT 2025 Sat Apr 13 16:39:56 EDT 2024 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Cyber deception Cybersecurity Honeypot performance Professional adversaries Honeynet efficiency |
Language | English |
License | This is an open access article under the CC BY license. |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c344t-fb451c546a805f33d40cae660fba2bba5b8b7bb4475f09d50f14ed02c0a3ee243 |
OpenAccessLink | https://www.sciencedirect.com/science/article/pii/S0167404824000932 |
ParticipantIDs | crossref_citationtrail_10_1016_j_cose_2024_103792 crossref_primary_10_1016_j_cose_2024_103792 elsevier_sciencedirect_doi_10_1016_j_cose_2024_103792 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | May 2024 2024-05-00 |
PublicationDateYYYYMMDD | 2024-05-01 |
PublicationDate_xml | – month: 05 year: 2024 text: May 2024 |
PublicationDecade | 2020 |
PublicationTitle | Computers & security |
PublicationYear | 2024 |
Publisher | Elsevier Ltd |
Publisher_xml | – name: Elsevier Ltd |
References | Bringer, Chelmecki, Fujinoki (br0930) 2012; 4 Erguler (br0790) March 2016; 13 Koziol (br0190) 2003 Wang (br0020) 2022 Chen, Buford (br0560) 2009 Kiekintveld, Lisỳ, Píbil (br1320) 2015 Fan, Fernández, Du (br0400) 2017; 11 Pashaei, Akbari, Lighvan, Charmin (br1890) 2022; 16 Abdulqadder, Zou, Aziz (br1840) 2023; 141 Durkota, Lisỳ, Bošanskỳ, Kiekintveld (br1330) 2015 Pawlick, Zhu (br1420) 2015 Ren, Zhang (br1470) 2020; 97 Hayatle, Otrok, Youssef (br0610) June 2012 Drew, Heinen (br1650) 2022 Shakarian, Paulo, Albanese, Jajodia (br0710) 2014 Abay, Akcora, Zhou, Kantarcioglu, Thuraisingham (br0630) 2019 La, Quek, Lee, Jin, Zhu (br0840) 2016; 3 Jonsson, Marteni (br1020) 2022 Cantella (br1580) 2021 Suratkar, Shah, Sood, Loya, Bisure, Patil, Kazi (br0740) 2021 Jones (br2050) 2022 Sethuraman, Jadapalli, Sudhakaran, Mohanty (br1660) 2023; 50 Bowen, Hershkop, Keromytis, Stolfo (br1050) 2009 Zhu, Anwar, Wan, Cho, Kamhoua, Singh (br1240) 2021; 23 Benzaïd, Taleb (br2040) 2020; 34 Soundararajan, Rajagopal, Muthuramalingam, Hossain, Lloret (br1900) 2022; 22 Zobal, Kolář, Fujdiak (br0240) 2019 De Faveri, Moreira, Amaral (br1550) 2018; 141 Pawlick, Colbert, Zhu (br1610) 2019; 52 Limouchi, Mahgoub (br1450) 2021 Wegerer, Tjoa (br0800) Aug 2016 Rich (br2080) 2023 Pawlick, Zhu (br1250) 2021 Srinivasa, Pedersen, Vasilomanolakis (br1130) 2022 Akingbola, Dahunsi, Alese, Adewale, Ogundele (br0670) 06 2015; 4 Javadpour, Ja'fari, Taleb, Benzaıd (br0120) 2023 Valero, Pérez, Celdrán, Pérez (br0050) 2020 Biedermann, Mink, Katzenbeisser (br0860) 2012 Agarwal (br2070) 2022 Tan, Eng, How, Zhu, Jyh (br1870) 2023 Yang, Yuan, Yang, Kong, Zhang, Zhao (br1800) 2023; 15 Shin, Lowry (br1150) 2020; 92 Khan, Abbasi (br0480) 2020; 9 Raharjo, Nurmala, Pambudi, Sari (br1750) 2022 Javadpour, Ja'fari, Taleb, Shojafar, Yang (br0030) 2022; 18 Kheir, Abdelrazek, Daniel (br2010) 2022 Priya, Chakkaravarthy (br1640) 2023; 13 Papaspirou, Maglaras, Ferrag, Kantzavelou, Janicke, Douligeris (br1010) 2021 Hedayati, Mostafavi (br0100) 2021 Fan, Du, Fernández, Villagra (br0160) 2017; 12 Kumar, Sehgal, Bhatia (br0310) 2012 Dantu, Cangussu, Patwardhan (br0680) 2007; 4 Salimova (br1830) 2022; 2 Voris, Jermyn, Keromytis, Stolfo (br1070) 2013 Fan, Fernández (br0900) 2017 Ackerman (br1180) 2020 Anwar, Kamhoua, Leslie, Kiekintveld (br1980) 2022; 19 Javadpour, Ja'fari, Taleb, Benzaïd (br1990) 2023 Ikuomenisan, Morgan (br1780) 2022; 13 Izagirre (br1030) 2017 Wang, Santillan, Kuipers (br0420) 2018 Riggs, Tufail, Parvez, Tariq, Khan, Amir, Vuda, Sarwat (br2090) 2023; 23 Perevozchikov, Shaymardanov, Chugunkov (br0370) 2017 Han, Kheir, Balzarotti (br1630) 2018; 51 Seungjin, Abdullah, Jhanjhi (br0250) 2020; 11 Javadpour, Abharian, Wang (br0090) 2017 Rahmatullah, Nasution, Azmi (br0350) 2016 Argyratos (br1500) 2021 Han, Zhao, Doupé, Ahn (br0170) 2016 Alosefer, Rana (br0300) 2010 Panda, Rass, Moschoyiannis, Liang, Loukas, Panaousis (br1760) 2022; 10 Rossotti (br2110) 2022 Badr, Hariri, Youssif, Blasch (br1210) 2015; 51 Shi, Jiang, Liu, Han (br1200) 2012 Ganesarathinam, Prabakar, Singaravelu, Fernandez (br0180) 2020 Carroll, Grosu (br1390) 2011; 4 Shabtai, Bercovitch, Rokach, Gal, Elovici, Shmueli (br0940) 2016; 18 Nazario (br0280) 2009; 9 Hirata, Miyamoto, Nakayama, Esaki (br0340) Nov 2015 Fraunholz, Krohmer, Anton, Schotten (br0380) 2017 Om Kumar, Sathia Bhama (br0980) 2019; 75 Toor, Bhandari (br0110) 2017 Javadpour, Pinto, Ja'fari, Zhang (br0060) 2023; 26 Zhuge, Holz, Han, Guo, Zou (br0270) 2007 White, Park, Kamhoua, Kwiat (br1000) 2014; 4 Park, Dang, Noh, Yi, Park (br0450) 2019 Bedi, Roy, Shiva (br1120) 2011 Fan, Du, Smith-Creasey, Fernandez (br0440) 2019; 37 Pauna, Iacob, Bica (br0730) 2018 Eriksson (br1740) 2023 Gjermundrød, Dionysiou (br0700) 2015 Almeshekah, Spafford, Atallah (br1160) 2013 Domingue, Lakhtakia, Pulsifer, Hall, Badding, Bischof, Martín-Palma, Imrei, Janik, Mastro (br1080) 2014; 111 Çeker, Zhuang, Upadhyaya, La, Soong (br1400) 2016 Fraunholz, Anton, Lipps, Reti, Krohmer, Pohl, Tammen, Schotten (br0220) 2018 Cranford, Ou, Gonzalez, Tambe, Lebiere (br1720) 2023 Qin, Jiang, Cen, Doss (br0990) 2023 Park, Stolfo (br0820) 2012 Chakraborty, Jajodia, Katz, Picariello, Sperli, Subrahmanian (br0640) 2019 Adjou, Benzaïd, Taleb (br1950) 2022 Huang, Fan, Huang, Cheng, Xiao (br0590) 2020; vol. 1 Kreps (br1490) 1989 Almeshekah, Spafford (br1560) 2014 Ferretti, Pogliani, Zanero (br0430) 2019 Hobert, Lim, Budiarto (br1770) 2023 Anwar, Kamhoua, Leslie (br1360) 2019 Kolias, Kambourakis, Stavrou, Voas (br0010) 2017; 50 Jones (br1090) 2016; 40 Pa, Suzuki, Yoshioka, Matsumoto, Kasama, Rossow (br0360) 2016; 24 De Faveri, Moreira (br1540) 2016 Jiang, Hao, Wang (br0290) 2010; vol. 1 Luo, Xu, Jin, Jia, Ouyang (br0410) 2017 Shumakov, Troitskiy, Silnov (br0580) June 2017 Sarr, Anwar, Kamhoua, Leslie, Acosta (br1350) 2020 Ibrahim, Tariq, Ahamed Ahanger, Tariq, Gebali (br2100) 2023; 11 Javadpour, Ja'fari, Taleb, Shojafar (br0040) 2022 Durkota, Lisỳ, Bošanskỳ, Kiekintveld (br1340) 2015 Sun, Sun, Li (br1060) 2020 Suryawanshi, Tayade, Patil, Patil, Rajput (br0780) 2017; vol. 2 Conti, Trolese, Turrin (br1910) 2022 Cai, Yegneswaran, Alfeld, Barford (br1380) 2009 Fraunholz, Schotten (br0660) 2018 Javadpour (br2030) 2019; 106 Naeem, Batchelder, Hendren (br0540) 2007 Tabari, Liu, Ou, Singhal (br1860) 2023 Feng, Lubis (br2120) 2022 Achleitner, La Porta, McDaniel, Sugrim, Krishnamurthy, Chadha (br0720) 2017; 14 Razali, Razali, Mansor, Muruti, Jamil (br0230) 2018 Maesschalck, Giotsas, Green, Race (br1670) 2022; 114 Naik, Shang, Jenkins, Shen (br0460) 2020 Faveri (br1230) 2022 Nelson, Wilson, Rosen, Yen (br0530) 2009; 30 Whaley (br1600) 1982; 5 Jha (br1930) 2023; 5 Ferguson-Walter, Major, Johnson, Johnson, Scott, Gutzwiller, Shade (br1710) 2023; 130 Sahin, Hébert, Cabrera Lozoya (br1040) 2022 Althonayan, Andronache (br1260) 2019 You, Lv, Zhao, Niu, Shi, Sun (br0470) 2020 Alyas, Alissa, Alqahtani, Faiz, Alsaif, Tabassum, Naqvi (br1880) 2022; 2022 Gonzalez, Aggarwal, Cranford, Lebiere (br1700) 2022 Srinivasa, Pedersen, Vasilomanolakis (br0970) 2020 Ja'fari, Mostafavi, Mizanian, Jafari (br0490) 2021; 12 Pawlick, Colbert, Zhu (br1430) 2018; 14 Sangaiah, Javadpour, Ja'fari, Pinto, Zhang, Balasubramanian (br0070) 2023; 26 Dahbul, Lim, Purnama (br0550) 2017; vol. 801 McCarthy, Ghadafi, Andriotis, Legg (br0500) 2022; 2 Rowe (br0620) Jan 2006; vol. 6 Sumadi, Widagdo, Reza (br1810) 2022; 6 Steingartner, Galinec, Kozina (br1220) 2021; 13 Javadpour (br1970) 2020; 110 Khoa, Do Hoang, Ngo-Khanh, Duy, Pham (br1960) 2023 Píbil, Lisỳ, Kiekintveld, Bošanskỳ, Pěchouček (br1310) 2012 Doubleday, Maglaras, Janicke (br0140) 2016 Garg, Grosu (br1410) June 2007 Popli, Girdhar (br0520) 2019 Guerra Manzanares (br0390) 2017 Fan, Du, Fernández (br0150) 2015 Mokube, Adams (br0960) 2007 Crouse (br1280) 2012 Siniosoglou, Efstathopoulos, Pliatsios, Moscholios, Sarigiannidis, Sakellari, Loukas, Sarigiannidis (br0570) 2020 de Nobrega (br1140) 2023 Wang, Wu (br0890) 2019 Javadpour, Wang (br1940) 2022; 78 Zhang, Thing (br1170) 2021; 106 Fraunholz, Schotten (br1300) 2018 Gautam, Kumar, Bhattacharya (br0200) Dec 2015 Anwar, Kamhoua, Leslie (br1370) 2020 Han, Molinaro, Picariello, Sperli, Subrahmanian, Xiong (br0650) 2021 Wang, Du, Maharjan, Sun (br0510) 2017; 8 Benzaïd, Taleb, Song (br2000) 2022; 36 Crochelet, Neal, Cuppens, Cuppens (br1790) 2022 Almeshekah, Spafford (br0130) 2016 Santhosh Kumar, Selvi, Kannan (br1730) 2023; 2023 Rowe, Custy, Duong (br0910) 2007; 2 Sardana, Joshi (br0870) 2009; 32 Kandanaarachchi, Ochiai, Rao (br1680) 2022; 201 Crouse, Prosser, Fulp (br1290) 2015 Zarras (br0330) Oct 2014 Sun, Yuan, Lee, Bishop, Porter, Li, Gregio, Oliveira (br0690) 2017 Ayeni, Alese, Omotosho (br0320) 2013; 975 Graham, Olson, Howard (br1510) 2016 Mohan, Dixit, Gyaneshwar, Chadha, Srinivasan, Seo (br1100) 2022; 22 Tian, Bates, Butler (br0880) 2015 Huang, Zhu (br1460) 2019 Heckman, Stech, Thomas, Schmoker, Tsow (br1520) 2015; 64 McCoy (br2060) 2022 Dalamagkas, Sarigiannidis, Ioannidis, Iturbe, Nikolis, Ramos, Rios, Sarigiannidis, Tzovaras (br0920) 2019 Yamin, Katt (br1850) 2022; 122 Juels, Rivest (br0760) 2013; vol. 11 Lackner (br0260) 2021 Marble, Lawless, Mittu, Coyne, Abramson, Sibley (br1190) 2015 Bilinski, Gabrys, Mauger (br1440) 2018 Akiyama, Yagi, Hariu, Kadobayashi (br0830) 2018; 17 Sangaiah, Javadpour, Pinto (br0080) 2023 Msaad, Srinivasa, Andersen, Audran, Orji, Vasilomanolakis (br0950) 2022 Apruzzese, Laskov, Montes de Oca, Mallouli, Brdalo Rapa, Grammatopoulos, Di Franco (br1920) 2023; 4 Bercovitch, Renford, Hasson, Shabtai, Rokach, Elovici (br0770) 2011 Selvaraj, Kuthadi, Marwala (br0850) 2016 Wang, He, Zhang, Liu, Liu, Javadpour (br1530) 2022; 102 Dowling, Schukat, Barrett (br0750) 2018 Ferguson-Walter, Major, Johnson, Muhleman (br0210) 2021 Ren, Zhang, Hao (br1480) 2021; 116 Wagener, Dulaunoy, Engel (br0600) 2009 Chung, Yang, Wang, Cento, Jerath, Raman, Lie, Chignell (br1690) 2023 Bilinski (10.1016/j.cose.2024.103792_br1440) 2018 Huang (10.1016/j.cose.2024.103792_br1460) 2019 Suratkar (10.1016/j.cose.2024.103792_br0740) 2021 Sangaiah (10.1016/j.cose.2024.103792_br0070) 2023; 26 Fraunholz (10.1016/j.cose.2024.103792_br0660) 2018 Raharjo (10.1016/j.cose.2024.103792_br1750) 2022 Althonayan (10.1016/j.cose.2024.103792_br1260) 2019 Huang (10.1016/j.cose.2024.103792_br0590) 2020; vol. 1 Ackerman (10.1016/j.cose.2024.103792_br1180) 2020 Rich (10.1016/j.cose.2024.103792_br2080) 2023 Tabari (10.1016/j.cose.2024.103792_br1860) 2023 Heckman (10.1016/j.cose.2024.103792_br1520) 2015; 64 Perevozchikov (10.1016/j.cose.2024.103792_br0370) 2017 Alosefer (10.1016/j.cose.2024.103792_br0300) 2010 Dowling (10.1016/j.cose.2024.103792_br0750) 2018 McCoy (10.1016/j.cose.2024.103792_br2060) 2022 Graham (10.1016/j.cose.2024.103792_br1510) 2016 Razali (10.1016/j.cose.2024.103792_br0230) 2018 Soundararajan (10.1016/j.cose.2024.103792_br1900) 2022; 22 Erguler (10.1016/j.cose.2024.103792_br0790) 2016; 13 Ferguson-Walter (10.1016/j.cose.2024.103792_br0210) 2021 Pawlick (10.1016/j.cose.2024.103792_br1610) 2019; 52 Shi (10.1016/j.cose.2024.103792_br1200) 2012 De Faveri (10.1016/j.cose.2024.103792_br1550) 2018; 141 Gonzalez (10.1016/j.cose.2024.103792_br1700) 2022 Shumakov (10.1016/j.cose.2024.103792_br0580) 2017 Khoa (10.1016/j.cose.2024.103792_br1960) 2023 Javadpour (10.1016/j.cose.2024.103792_br0090) 2017 Anwar (10.1016/j.cose.2024.103792_br1980) 2022; 19 Voris (10.1016/j.cose.2024.103792_br1070) 2013 Toor (10.1016/j.cose.2024.103792_br0110) 2017 Wang (10.1016/j.cose.2024.103792_br0510) 2017; 8 Crouse (10.1016/j.cose.2024.103792_br1290) 2015 Fan (10.1016/j.cose.2024.103792_br0400) 2017; 11 Pa (10.1016/j.cose.2024.103792_br0360) 2016; 24 Shakarian (10.1016/j.cose.2024.103792_br0710) 2014 Hobert (10.1016/j.cose.2024.103792_br1770) 2023 Whaley (10.1016/j.cose.2024.103792_br1600) 1982; 5 Fan (10.1016/j.cose.2024.103792_br0440) 2019; 37 Hedayati (10.1016/j.cose.2024.103792_br0100) 2021 Ayeni (10.1016/j.cose.2024.103792_br0320) 2013; 975 Javadpour (10.1016/j.cose.2024.103792_br0120) 2023 Gautam (10.1016/j.cose.2024.103792_br0200) 2015 Naeem (10.1016/j.cose.2024.103792_br0540) 2007 Dahbul (10.1016/j.cose.2024.103792_br0550) 2017; vol. 801 Naik (10.1016/j.cose.2024.103792_br0460) 2020 McCarthy (10.1016/j.cose.2024.103792_br0500) 2022; 2 Anwar (10.1016/j.cose.2024.103792_br1360) 2019 Papaspirou (10.1016/j.cose.2024.103792_br1010) 2021 Steingartner (10.1016/j.cose.2024.103792_br1220) 2021; 13 Zhuge (10.1016/j.cose.2024.103792_br0270) 2007 Durkota (10.1016/j.cose.2024.103792_br1340) 2015 Jones (10.1016/j.cose.2024.103792_br1090) 2016; 40 Apruzzese (10.1016/j.cose.2024.103792_br1920) 2023; 4 Píbil (10.1016/j.cose.2024.103792_br1310) 2012 Almeshekah (10.1016/j.cose.2024.103792_br1560) 2014 Adjou (10.1016/j.cose.2024.103792_br1950) 2022 Ganesarathinam (10.1016/j.cose.2024.103792_br0180) 2020 Park (10.1016/j.cose.2024.103792_br0820) 2012 Rossotti (10.1016/j.cose.2024.103792_br2110) 2022 Sethuraman (10.1016/j.cose.2024.103792_br1660) 2023; 50 Kolias (10.1016/j.cose.2024.103792_br0010) 2017; 50 Sarr (10.1016/j.cose.2024.103792_br1350) 2020 Benzaïd (10.1016/j.cose.2024.103792_br2000) 2022; 36 Abdulqadder (10.1016/j.cose.2024.103792_br1840) 2023; 141 Pawlick (10.1016/j.cose.2024.103792_br1250) 2021 Riggs (10.1016/j.cose.2024.103792_br2090) 2023; 23 Javadpour (10.1016/j.cose.2024.103792_br1990) 2023 Pauna (10.1016/j.cose.2024.103792_br0730) 2018 Han (10.1016/j.cose.2024.103792_br0170) 2016 Sangaiah (10.1016/j.cose.2024.103792_br0080) 2023 Tan (10.1016/j.cose.2024.103792_br1870) 2023 Bowen (10.1016/j.cose.2024.103792_br1050) 2009 Crouse (10.1016/j.cose.2024.103792_br1280) 2012 Cranford (10.1016/j.cose.2024.103792_br1720) 2023 Panda (10.1016/j.cose.2024.103792_br1760) 2022; 10 Chung (10.1016/j.cose.2024.103792_br1690) 2023 Doubleday (10.1016/j.cose.2024.103792_br0140) 2016 Ibrahim (10.1016/j.cose.2024.103792_br2100) 2023; 11 Santhosh Kumar (10.1016/j.cose.2024.103792_br1730) 2023; 2023 Sardana (10.1016/j.cose.2024.103792_br0870) 2009; 32 Fan (10.1016/j.cose.2024.103792_br0150) 2015 Fan (10.1016/j.cose.2024.103792_br0160) 2017; 12 Javadpour (10.1016/j.cose.2024.103792_br0060) 2023; 26 Wegerer (10.1016/j.cose.2024.103792_br0800) 2016 Zhang (10.1016/j.cose.2024.103792_br1170) 2021; 106 Rowe (10.1016/j.cose.2024.103792_br0620) 2006; vol. 6 de Nobrega (10.1016/j.cose.2024.103792_br1140) 2023 Pawlick (10.1016/j.cose.2024.103792_br1420) Marble (10.1016/j.cose.2024.103792_br1190) 2015 Eriksson (10.1016/j.cose.2024.103792_br1740) 2023 Srinivasa (10.1016/j.cose.2024.103792_br1130) 2022 Almeshekah (10.1016/j.cose.2024.103792_br0130) 2016 Jonsson (10.1016/j.cose.2024.103792_br1020) 2022 Yamin (10.1016/j.cose.2024.103792_br1850) 2022; 122 Nazario (10.1016/j.cose.2024.103792_br0280) 2009; 9 Javadpour (10.1016/j.cose.2024.103792_br2030) 2019; 106 Sahin (10.1016/j.cose.2024.103792_br1040) 2022 Sumadi (10.1016/j.cose.2024.103792_br1810) 2022; 6 Abay (10.1016/j.cose.2024.103792_br0630) 2019 Popli (10.1016/j.cose.2024.103792_br0520) 2019 Seungjin (10.1016/j.cose.2024.103792_br0250) 2020; 11 Chakraborty (10.1016/j.cose.2024.103792_br0640) 2019 Conti (10.1016/j.cose.2024.103792_br1910) 2022 Cai (10.1016/j.cose.2024.103792_br1380) 2009 Kiekintveld (10.1016/j.cose.2024.103792_br1320) 2015 Suryawanshi (10.1016/j.cose.2024.103792_br0780) 2017; vol. 2 Javadpour (10.1016/j.cose.2024.103792_br0040) 2022 Salimova (10.1016/j.cose.2024.103792_br1830) 2022; 2 Mohan (10.1016/j.cose.2024.103792_br1100) 2022; 22 Jiang (10.1016/j.cose.2024.103792_br0290) 2010; vol. 1 Wagener (10.1016/j.cose.2024.103792_br0600) 2009 Jones (10.1016/j.cose.2024.103792_br2050) 2022 Biedermann (10.1016/j.cose.2024.103792_br0860) 2012 Carroll (10.1016/j.cose.2024.103792_br1390) 2011; 4 Zobal (10.1016/j.cose.2024.103792_br0240) 2019 Ren (10.1016/j.cose.2024.103792_br1480) 2021; 116 Akiyama (10.1016/j.cose.2024.103792_br0830) 2018; 17 Durkota (10.1016/j.cose.2024.103792_br1330) 2015 Rowe (10.1016/j.cose.2024.103792_br0910) 2007; 2 Faveri (10.1016/j.cose.2024.103792_br1230) 2022 Srinivasa (10.1016/j.cose.2024.103792_br0970) 2020 Pawlick (10.1016/j.cose.2024.103792_br1430) 2018; 14 Achleitner (10.1016/j.cose.2024.103792_br0720) 2017; 14 Qin (10.1016/j.cose.2024.103792_br0990) 2023 Tian (10.1016/j.cose.2024.103792_br0880) 2015 Feng (10.1016/j.cose.2024.103792_br2120) 2022 Bedi (10.1016/j.cose.2024.103792_br1120) 2011 Hayatle (10.1016/j.cose.2024.103792_br0610) 2012 Fan (10.1016/j.cose.2024.103792_br0900) 2017 Guerra Manzanares (10.1016/j.cose.2024.103792_br0390) 2017 Almeshekah (10.1016/j.cose.2024.103792_br1160) 2013 Bringer (10.1016/j.cose.2024.103792_br0930) 2012; 4 Fraunholz (10.1016/j.cose.2024.103792_br1300) 2018 Sun (10.1016/j.cose.2024.103792_br0690) 2017 Agarwal (10.1016/j.cose.2024.103792_br2070) 2022 Chen (10.1016/j.cose.2024.103792_br0560) 2009 Wang (10.1016/j.cose.2024.103792_br0420) Javadpour (10.1016/j.cose.2024.103792_br1940) 2022; 78 Om Kumar (10.1016/j.cose.2024.103792_br0980) 2019; 75 Priya (10.1016/j.cose.2024.103792_br1640) 2023; 13 Akingbola (10.1016/j.cose.2024.103792_br0670) 2015; 4 Jha (10.1016/j.cose.2024.103792_br1930) 2023; 5 Alyas (10.1016/j.cose.2024.103792_br1880) 2022; 2022 Gjermundrød (10.1016/j.cose.2024.103792_br0700) 2015 Maesschalck (10.1016/j.cose.2024.103792_br1670) 2022; 114 Drew (10.1016/j.cose.2024.103792_br1650) 2022 Wang (10.1016/j.cose.2024.103792_br0020) 2022 Zhu (10.1016/j.cose.2024.103792_br1240) 2021; 23 Garg (10.1016/j.cose.2024.103792_br1410) 2007 Anwar (10.1016/j.cose.2024.103792_br1370) 2020 Luo (10.1016/j.cose.2024.103792_br0410) 2017 Javadpour (10.1016/j.cose.2024.103792_br1970) 2020; 110 Siniosoglou (10.1016/j.cose.2024.103792_br0570) 2020 Wang (10.1016/j.cose.2024.103792_br1530) 2022; 102 Rahmatullah (10.1016/j.cose.2024.103792_br0350) 2016 Park (10.1016/j.cose.2024.103792_br0450) 2019 Cantella (10.1016/j.cose.2024.103792_br1580) 2021 Shabtai (10.1016/j.cose.2024.103792_br0940) 2016; 18 Pashaei (10.1016/j.cose.2024.103792_br1890) 2022; 16 Domingue (10.1016/j.cose.2024.103792_br1080) 2014; 111 Ja'fari (10.1016/j.cose.2024.103792_br0490) 2021; 12 Hirata (10.1016/j.cose.2024.103792_br0340) 2015 Selvaraj (10.1016/j.cose.2024.103792_br0850) 2016 Kheir (10.1016/j.cose.2024.103792_br2010) 2022 Izagirre (10.1016/j.cose.2024.103792_br1030) 2017 Kandanaarachchi (10.1016/j.cose.2024.103792_br1680) 2022; 201 Nelson (10.1016/j.cose.2024.103792_br0530) 2009; 30 Yang (10.1016/j.cose.2024.103792_br1800) 2023; 15 Çeker (10.1016/j.cose.2024.103792_br1400) 2016 Argyratos (10.1016/j.cose.2024.103792_br1500) 2021 Fraunholz (10.1016/j.cose.2024.103792_br0220) Valero (10.1016/j.cose.2024.103792_br0050) 2020 Han (10.1016/j.cose.2024.103792_br1630) 2018; 51 Badr (10.1016/j.cose.2024.103792_br1210) 2015; 51 You (10.1016/j.cose.2024.103792_br0470) 2020 Dalamagkas (10.1016/j.cose.2024.103792_br0920) 2019 Mokube (10.1016/j.cose.2024.103792_br0960) 2007 Dantu (10.1016/j.cose.2024.103792_br0680) 2007; 4 Crochelet (10.1016/j.cose.2024.103792_br1790) 2022 Shin (10.1016/j.cose.2024.103792_br1150) 2020; 92 Wang (10.1016/j.cose.2024.103792_br0890) 2019 Kumar (10.1016/j.cose.2024.103792_br0310) 2012 Juels (10.1016/j.cose.2024.103792_br0760) 2013; vol. 11 Ren (10.1016/j.cose.2024.103792_br1470) 2020; 97 Lackner (10.1016/j.cose.2024.103792_br0260) 2021 De Faveri (10.1016/j.cose.2024.103792_br1540) 2016 Koziol (10.1016/j.cose.2024.103792_br0190) 2003 Zarras (10.1016/j.cose.2024.103792_br0330) 2014 Bercovitch (10.1016/j.cose.2024.103792_br0770) 2011 Javadpour (10.1016/j.cose.2024.103792_br0030) 2022; 18 Msaad (10.1016/j.cose.2024.103792_br0950) 2022 Han (10.1016/j.cose.2024.103792_br0650) 2021 Ikuomenisan (10.1016/j.cose.2024.103792_br1780) 2022; 13 Limouchi (10.1016/j.cose.2024.103792_br1450) 2021 Khan (10.1016/j.cose.2024.103792_br0480) 2020; 9 Kreps (10.1016/j.cose.2024.103792_br1490) 1989 White (10.1016/j.cose.2024.103792_br1000) 2014; 4 Fraunholz (10.1016/j.cose.2024.103792_br0380) 2017 Ferguson-Walter (10.1016/j.cose.2024.103792_br1710) 2023; 130 La (10.1016/j.cose.2024.103792_br0840) 2016; 3 Sun (10.1016/j.cose.2024.103792_br1060) 2020 Benzaïd (10.1016/j.cose.2024.103792_br20 |
References_xml | – start-page: 156 year: 2018 end-page: 161 ident: br1300 article-title: Strategic defense and attack in deception based network security publication-title: 2018 International Conference on Information Networking (ICOIN) – start-page: 6662 year: June 2012 end-page: 6667 ident: br0610 article-title: A game theoretic investigation for high interaction honeypots publication-title: 2012 IEEE International Conference on Communications (ICC) – volume: 12 start-page: 2993 year: 2021 end-page: 3016 ident: br0490 article-title: An intelligent botnet blocking approach in software defined networks using honeypots publication-title: J. Ambient Intell. Humaniz. Comput. – volume: 11 start-page: 249 year: 2023 ident: br2100 article-title: Retaliation against ransomware in cloud-enabled pureos system publication-title: Mathematics – start-page: 341 year: 2018 end-page: 355 ident: br0750 article-title: Using reinforcement learning to conceal honeypot functionality publication-title: Joint European Conference on Machine Learning and Knowledge Discovery in Databases – year: 2022 ident: br0020 article-title: The Observation of Smart Camera Security – volume: 18 start-page: 667 year: 2022 end-page: 682 ident: br0030 article-title: SCEMA: an SDN-oriented cost-effective edge-based MTD approach publication-title: IEEE Trans. Inf. Forensics Secur. – volume: 130 year: 2023 ident: br1710 article-title: Cyber expert feedback: experiences, expectations, and opinions about cyber deception publication-title: Comput. Secur. – year: 2021 ident: br1500 article-title: Information theoretic analysis of deception and decisions in networks – volume: 50 year: 2023 ident: br1660 article-title: Flow based containerized honeypot approach for network traffic analysis: an empirical study publication-title: Comput. Sci. Rev. – volume: 4 start-page: 373 year: 06 2015 end-page: 379 ident: br0670 article-title: Improving deception capability in honeynet through data manipulation publication-title: J. Internet Technol. Secur. Trans. – start-page: 1 year: 2016 end-page: 6 ident: br0170 article-title: Honeymix: toward sdn-based intelligent honeynet publication-title: Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization – start-page: 1602 year: 2019 end-page: 1606 ident: br0890 article-title: Sdn-based hybrid honeypot for attack capture publication-title: 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) – year: 2020 ident: br1180 article-title: Modern Cybersecurity Practices: Exploring and Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization – start-page: 16 year: Nov 2015 end-page: 24 ident: br0340 article-title: Intercept+: Sdn support for live migration-based honeypots publication-title: 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS) – year: 2015 ident: br1330 article-title: Optimal network security hardening using attack graph games publication-title: Twenty-Fourth International Joint Conference on Artificial Intelligence – year: 2018 ident: br0420 article-title: Thingpot: an interactive Internet-of-things honeypot – start-page: 195 year: June 2017 end-page: 198 ident: br0580 article-title: Increasing the attractiveness of false objects of attack on the web-servers publication-title: 2017 18th International Conference of Young Specialists on Micro/Nanotechnologies and Electron Devices (EDM) – start-page: 375 year: 2019 end-page: 377 ident: br0450 article-title: Dynamic virtual network honeypot publication-title: 2019 International Conference on Information and Communication Technology Convergence (ICTC) – volume: 114 year: 2022 ident: br1670 article-title: Don't get stung, cover your ics in honey: how do honeypots fit within industrial control system security publication-title: Comput. Secur. – volume: 23 start-page: 2460 year: 2021 end-page: 2493 ident: br1240 article-title: A survey of defensive deception: approaches using game theory and machine learning publication-title: IEEE Commun. Surv. Tutor. – volume: 30 start-page: 737 year: 2009 end-page: 743 ident: br0530 article-title: Refined metrics for measuring ideation effectiveness publication-title: Des. Stud. – start-page: 101 year: 2022 end-page: 119 ident: br0950 article-title: Honeysweeper: towards stealthy honeytoken fingerprinting techniques publication-title: Nordic Conference on Secure IT Systems – start-page: 1 year: 2020 end-page: 5 ident: br0470 article-title: A scalable high-interaction physical honeypot framework for programmable logic controller publication-title: 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall) – start-page: 1 year: 2020 end-page: 7 ident: br0570 article-title: Neuralpot: an industrial honeypot implementation based on deep neural networks publication-title: 2020 IEEE Symposium on Computers and Communications (ISCC) – start-page: 1 year: 2017 end-page: 7 ident: br0380 article-title: Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot publication-title: 2017 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) – year: 2023 ident: br1140 article-title: Cyber Defensive Capacity and Capability:: A Perspective from the Financial Sector of a Small State – start-page: 1 year: 2022 end-page: 4 ident: br1910 article-title: Icspot: a high-interaction honeypot for industrial control systems publication-title: 2022 International Symposium on Networks, Computers and Communications (ISNCC) – start-page: 75 year: 2022 end-page: 79 ident: br1750 article-title: Performance evaluation of intrusion detection system performance for traffic anomaly detection based on active ip reputation rules publication-title: 2022 3rd International Conference on Electrical Engineering and Informatics (ICon EEI) – year: 2017 ident: br0390 article-title: Honeyio4: the construction of a virtual, low-interaction iot honeypot – start-page: 01 year: 2022 end-page: 04 ident: br2120 article-title: Defense-in-depth security strategy in log4j vulnerability analysis publication-title: 2022 International Conference Advancement in Data Science, E-learning and Information Systems (ICADEIS) – volume: 122 year: 2022 ident: br1850 article-title: Use of cyber attack and defense agents in cyber ranges: a case study publication-title: Comput. Secur. – start-page: 1 year: 2020 end-page: 9 ident: br1060 article-title: Towards a believable decoy system: replaying network activities from real system publication-title: 2020 IEEE Conference on Communications and Network Security (CNS) – volume: 5 start-page: 178 year: 1982 end-page: 192 ident: br1600 article-title: Toward a general theory of deception publication-title: J. Strateg. Stud. – year: 2023 ident: br1990 article-title: Reinforcement learning-based slice isolation against ddos attacks in beyond 5g networks publication-title: IEEE Trans. Netw. Serv. Manag. – year: 2023 ident: br1740 article-title: An Evaluation of Honeypots with Compliant Kubernetes – start-page: 1 year: 2017 end-page: 11 ident: br0410 article-title: Iotcandyjar: towards an intelligent-interaction honeypot for iot devices publication-title: Black Hat – volume: 13 start-page: 210 year: 2022 end-page: 243 ident: br1780 article-title: Systematic review of graphical visual methods in honeypot attack data analysis publication-title: J. Inf. Secur. – start-page: 115 year: 2018 end-page: 126 ident: br1440 article-title: Optimal placement of honeypots for network defense publication-title: International Conference on Decision and Game Theory for Security – start-page: 81 year: 2023 end-page: 88 ident: br0120 article-title: A mathematical model for analyzing honeynets and their cyber deception techniques publication-title: 2023 27th International Conference on Engineering of Complex Computer Systems (ICECCS) – start-page: 81 year: 2015 end-page: 101 ident: br1320 article-title: Game-theoretic foundations for the strategic use of honeypots in network security publication-title: Cyber Warfare – volume: 6 start-page: 39 year: 2022 end-page: 44 ident: br1810 article-title: Sd-honeypot integration for mitigating ddos attack using machine learning approaches publication-title: JOIV: Int. J. Inform. Vis. – start-page: 3 year: 2019 end-page: 19 ident: br0630 article-title: Using deep learning to generate relational honeydata publication-title: Autonomous Cyber Deception – year: 2017 ident: br1030 article-title: Deception Strategies for Web Application Security: Application-Layer Approaches and a Testing Platform – volume: vol. 1 start-page: 69 year: 2010 end-page: 72 ident: br0290 article-title: A malware sample capturing and tracking system publication-title: 2010 Second World Congress on Software Engineering – volume: 141 start-page: 339 year: 2023 end-page: 354 ident: br1840 article-title: The dag blockchain: a secure edge assisted honeypot for attack detection and multi-controller based load balancing in sdn 5g publication-title: Future Gener. Comput. Syst. – year: 2022 ident: br1650 article-title: Testing deception with a commercial tool simulating cyberspace – year: 2017 ident: br0110 article-title: Honeypot: a deceptive trap publication-title: Int. J. Eng. Technol. Manag. Appl. Sci. – start-page: 1127 year: 2021 end-page: 1144 ident: br0210 article-title: Examining the efficacy of decoy-based and psychological cyber deception publication-title: 30th USENIX Security Symposium (USENIX Security 21) – volume: 24 start-page: 522 year: 2016 end-page: 533 ident: br0360 article-title: Iotpot: a novel honeypot for revealing current iot threats publication-title: J. Inf. Process. – start-page: 21 year: 2015 end-page: 29 ident: br1290 article-title: Probabilistic performance analysis of moving target and deception reconnaissance defenses publication-title: Proceedings of the Second ACM Workshop on Moving Target Defense – volume: 22 start-page: 2194 year: 2022 ident: br1100 article-title: Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions publication-title: Sensors – volume: 14 start-page: 1871 year: 2018 end-page: 1886 ident: br1430 article-title: Modeling and analysis of leaky deception using signaling games with evidence publication-title: IEEE Trans. Inf. Forensics Secur. – year: 2020 ident: br0460 article-title: D-fri-honeypot: a secure sting operation for hacking the hackers using dynamic fuzzy rule interpolation publication-title: IEEE Trans. Emerg. Top. Comput. Intell. – volume: vol. 6 year: Jan 2006 ident: br0620 article-title: Measuring the effectiveness of honeypot counter-counterdeception publication-title: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06) – start-page: 21 year: 2018 end-page: 25 ident: br0660 article-title: Defending web servers with feints, distraction and obfuscation publication-title: 2018 International Conference on Computing, Networking and Communications (ICNC) – volume: 75 start-page: 8312 year: 2019 end-page: 8338 ident: br0980 article-title: Detecting and confronting flash attacks from iot botnets publication-title: J. Supercomput. – volume: 110 start-page: 1057 year: 2020 end-page: 1071 ident: br1970 article-title: Providing a way to create balance between reliability and delays in sdn networks by using the appropriate placement of controllers publication-title: Wirel. Pers. Commun. – volume: 22 start-page: 8046 year: 2022 ident: br1900 article-title: Interleaved honeypot-framing model with secure mac policies for wireless sensor networks publication-title: Sensors – start-page: 1 year: 2021 end-page: 12 ident: br0740 article-title: An adaptive honeypot using q-learning with severity analyzer publication-title: J. Ambient Intell. Humaniz. Comput. – start-page: 51 year: 2009 end-page: 70 ident: br1050 article-title: Baiting inside attackers using decoy documents publication-title: Security and Privacy in Communication Networks: 5th International ICST Conference – volume: vol. 11 start-page: 145 year: 2013 end-page: 160 ident: br0760 article-title: Honeywords: making password-cracking detectable publication-title: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security – volume: 975 start-page: 8887 year: 2013 ident: br0320 article-title: Design and implementation of a medium interaction honeypot publication-title: Int. J. Comput. Appl. – year: 2016 ident: br0140 article-title: Ssh Honeypot: Building, Deploying and Analysis – volume: 116 start-page: 76 year: 2021 end-page: 85 ident: br1480 article-title: A theoretical method to evaluate honeynet potency publication-title: Future Gener. Comput. Syst. – year: 2022 ident: br2060 article-title: A relevance model for threat-centric ranking of cybersecurity vulnerabilities – volume: 13 start-page: 284 year: March 2016 end-page: 295 ident: br0790 article-title: Achieving flatness: selecting the honeywords from existing user passwords publication-title: IEEE Trans. Dependable Secure Comput. – start-page: 4173 year: 2022 end-page: 4178 ident: br0040 article-title: A cost-effective mtd approach for ddos attacks in software-defined networks publication-title: GLOBECOM 2022-2022 IEEE Global Communications Conference – start-page: 1 year: Oct 2014 end-page: 6 ident: br0330 article-title: The art of false alarms in the game of deception: leveraging fake honeypots for enhanced security publication-title: 2014 International Carnahan Conference on Security Technology (ICCST) – start-page: 73 year: 2016 end-page: 82 ident: br0850 article-title: Honey pot: a major technique for intrusion detection publication-title: Proceedings of the Second International Conference on Computer and Communication Technologies – start-page: 13 year: 2012 end-page: 18 ident: br0860 article-title: Fast dynamic extracted honeypots in cloud computing publication-title: Proceedings of the 2012 ACM Workshop on Cloud Computing Security Workshop – start-page: 131 year: 2011 end-page: 136 ident: br0770 article-title: Honeygen: an automated honeytokens generator publication-title: Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics – volume: 3 start-page: 1025 year: 2016 end-page: 1035 ident: br0840 article-title: Deceptive attack and defense game in honeypot-enabled networks for the Internet of things publication-title: IEEE Int. Things J. – start-page: 6 year: Aug 2016 end-page: 10 ident: br0800 article-title: Defeating the database adversary using deception - a mysql database honeypot publication-title: 2016 International Conference on Software Security and Assurance (ICSSA) – start-page: 1 year: 2020 end-page: 5 ident: br0970 article-title: Towards systematic honeytoken fingerprinting publication-title: 13th International Conference on Security of Information and Networks – volume: 11 start-page: 418 year: 2020 end-page: 435 ident: br0250 article-title: A review on honeypot-based botnet detection models for smart factory publication-title: Int. J. Adv. Comput. Sci. Appl. – volume: 4 start-page: 119 year: 2007 end-page: 136 ident: br0680 article-title: Fast worm containment using feedback control publication-title: IEEE Trans. Dependable Secure Comput. – volume: 141 start-page: 32 year: 2018 end-page: 51 ident: br1550 article-title: Multi-paradigm deception modeling for cyber defense publication-title: J. Syst. Softw. – year: 2021 ident: br1250 article-title: Game Theory for Cyber Deception – start-page: 127 year: 2016 end-page: 131 ident: br0350 article-title: Implementation of low interaction web server honeypot using cubieboard publication-title: 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC) – volume: 18 start-page: 1 year: 2016 end-page: 21 ident: br0940 article-title: Behavioral study of users when interacting with active honeytokens publication-title: ACM Trans. Inf. Syst. Secur. – start-page: 173 year: 2015 end-page: 206 ident: br1190 article-title: The human factor in cybersecurity: robust & intelligent defense publication-title: Cyber Warfare: Building the Scientific Foundation – volume: 4 start-page: 1 year: 2014 end-page: 14 ident: br1000 article-title: Social network attack simulation with honeytokens publication-title: Soc. Netw. Anal. Min. – volume: 8 start-page: 2474 year: 2017 end-page: 2482 ident: br0510 article-title: Strategic honeypot game model for distributed denial of service attacks in the smart grid publication-title: IEEE Trans. Smart Grid – start-page: 93 year: 2018 end-page: 98 ident: br0230 article-title: Iot honeypot: a review from researcher's perspective publication-title: 2018 IEEE Conference on Application, Information and Network Security (AINS) – volume: 9 start-page: 911 year: 2009 end-page: 919 ident: br0280 article-title: Phoneyc: a virtual client honeypot publication-title: LEET – start-page: 261 year: 2015 end-page: 270 ident: br0880 article-title: Defending against malicious usb firmware with goodusb publication-title: Proceedings of the 31st Annual Computer Security Applications Conference – start-page: 2013 year: 2013 ident: br1160 article-title: Improving security using deception – volume: 51 start-page: 2623 year: 2015 end-page: 2637 ident: br1210 article-title: Resilient and trustworthy dynamic data-driven application systems (dddas) services for crisis management environments publication-title: Proc. Comput. Sci. – year: 2016 ident: br1510 article-title: Cyber Security Essentials – volume: 13 start-page: 1437 year: 2023 ident: br1640 article-title: Containerized cloud-based honeypot deception for tracking attackers publication-title: Sci. Rep. – year: 2023 ident: br1720 article-title: Accounting for Uncertainty in Deceptive Signaling for Cybersecurity – start-page: 51 year: 2019 end-page: 61 ident: br0430 article-title: Characterizing background noise in ics traffic through a set of low interaction honeypots publication-title: Proceedings of the ACM Workshop on Cyber-Physical Systems Security & Privacy – start-page: 7 year: 2009 end-page: 16 ident: br1380 article-title: An attacker-defender game for honeynets publication-title: COCOON – year: 2022 ident: br1020 article-title: Multi-Factor Authentication Mechanism Based on Browser Fingerprinting and Graphical Honeytokens – start-page: 65 year: 2019 end-page: 80 ident: br0520 article-title: Behavioural analysis of recent ransomwares and prediction of future attacks by polymorphic and metamorphic ransomware publication-title: Computational Intelligence: Theories, Applications and Future Directions-Volume II – volume: vol. 801 start-page: 012057 year: 2017 ident: br0550 article-title: Enhancing honeypot deception capability through network service fingerprinting publication-title: Journal of Physics: Conference Series – start-page: 73 year: 2023 end-page: 90 ident: br1860 article-title: Revealing human attacker behaviors using an adaptive Internet of things honeypot ecosystem publication-title: IFIP International Conference on Digital Forensics – volume: 9 start-page: 415 year: 2020 ident: br0480 article-title: Reputation management using honeypots for intrusion detection in the Internet of things publication-title: Electronics – start-page: 93 year: 2019 end-page: 100 ident: br0920 article-title: A survey on honeypots, honeynets and their applications on smart grid publication-title: 2019 IEEE Conference on Network Softwarization (NetSoft) – year: 2023 ident: br2080 article-title: A Longitudinal Analysis of Cyber Adversarial Tactics and Techniques – start-page: 123 year: 2017 end-page: 130 ident: br0690 article-title: The dose makes the poison—leveraging uncertainty for effective malware detection publication-title: 2017 IEEE Conference on Dependable and Secure Computing – year: 2021 ident: br0260 article-title: How to Mock a Bear: Honeypot, Honeynet, Honeywall & Honeytoken: A Survey – start-page: 105 year: 2020 end-page: 129 ident: br0050 article-title: Identification and classification of cyber threats through ssh honeypot systems publication-title: Handbook of Research on Intrusion Detection Systems – volume: 11 start-page: 38 year: 2017 end-page: 45 ident: br0400 article-title: Versatile virtual honeynet management framework publication-title: IET Inf. Secur. – start-page: 196 year: 2019 end-page: 216 ident: br1460 article-title: Adaptive honeypot engagement through reinforcement learning of semi-Markov decision processes publication-title: International Conference on Decision and Game Theory for Security – start-page: 741 year: 2009 end-page: 755 ident: br0600 article-title: Self adaptive high interaction honeypots driven by game theory publication-title: Symposium on Self-Stabilizing Systems – volume: 26 start-page: 599 year: 2023 end-page: 612 ident: br0070 article-title: A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things publication-title: Clust. Comput. – volume: 36 start-page: 165 year: 2022 end-page: 174 ident: br2000 article-title: Ai-based autonomic and scalable security management architecture for secure network slicing in b5g publication-title: IEEE Netw. – start-page: 1 year: 2021 end-page: 23 ident: br0100 article-title: A lightweight image encryption algorithm for secure communications in multimedia Internet of things publication-title: Wirel. Pers. Commun. – volume: 5 start-page: 232 year: 2023 end-page: 248 ident: br1930 article-title: An in-depth evaluation of hybrid approaches in soft computing for the identification of social engineering publication-title: J. Soft Comput. Paradig. – start-page: 127 year: 2014 end-page: 138 ident: br1560 article-title: Planning and integrating deception into computer security defenses publication-title: Proceedings of the 2014 New Security Paradigms Workshop – start-page: 18 year: 2016 end-page: 38 ident: br1400 article-title: Deception-based game theoretical approach to mitigate dos attacks publication-title: International Conference on Decision and Game Theory for Security – volume: 23 start-page: 4060 year: 2023 ident: br2090 article-title: Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure publication-title: Sensors – volume: 201 year: 2022 ident: br1680 article-title: Honeyboost: boosting honeypot performance with data fusion and anomaly detection publication-title: Expert Syst. Appl. – volume: 4 start-page: 1 year: 2023 end-page: 38 ident: br1920 article-title: The role of machine learning in cybersecurity publication-title: Digit. Treats Res. Pract. – start-page: 502 year: 2020 end-page: 506 ident: br1370 article-title: Honeypot allocation over attack graphs in cyber deception games publication-title: 2020 International Conference on Computing, Networking and Communications (ICNC) – start-page: 1 year: 2019 end-page: 9 ident: br1260 article-title: Resiliency under strategic foresight: the effects of cybersecurity management and enterprise risk management alignment publication-title: 2019 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA) – start-page: 39 year: 2020 end-page: 53 ident: br0180 article-title: A detailed analysis of intruders' activities in the network through the real-time virtual honeynet experimentation publication-title: Artificial Intelligence and Evolutionary Computations in Engineering Systems – start-page: 630 year: 2015 end-page: 635 ident: br0700 article-title: Cloudhoneycy-an integrated honeypot framework for cloud infrastructures publication-title: 2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC) – volume: 64 year: 2015 ident: br1520 article-title: Cyber denial, deception and counter deception publication-title: Adv. Inf. Secur. – year: 2019 ident: br0640 article-title: Forge: a fake online repository generation engine for cyber deception publication-title: IEEE Trans. Dependable Secure Comput. – start-page: 1 year: 2021 end-page: 7 ident: br1450 article-title: Reinforcement learning-assisted threshold optimization for dynamic honeypot adaptation to enhance iobt networks security publication-title: 2021 IEEE Symposium Series on Computational Intelligence (SSCI) – volume: 50 start-page: 80 year: 2017 end-page: 84 ident: br0010 article-title: Ddos in the iot: Mirai and other botnets publication-title: Computer – volume: 2023 year: 2023 ident: br1730 article-title: A comprehensive survey on machine learning-based intrusion detection systems for secure communication in Internet of things publication-title: Comput. Intell. Neurosci. – start-page: 337 year: 2022 end-page: 355 ident: br1040 article-title: An approach to generate realistic http parameters for application layer deception publication-title: International Conference on Applied Cryptography and Network Security – start-page: 1107 year: 2022 end-page: 1112 ident: br1950 article-title: Topotrust: a blockchain-based trustless and secure topology discovery in sdns publication-title: 2022 International Wireless Communications and Mobile Computing (IWCMC) – start-page: 441 year: 2018 end-page: 446 ident: br0730 article-title: Qrassh-a self-adaptive ssh honeypot driven by q-learning publication-title: 2018 International Conference on Communications (COMM) – start-page: 321 year: 2007 end-page: 326 ident: br0960 article-title: Honeypots: concepts, approaches, and challenges publication-title: Proceedings of the 45th Annual Southeast Regional Conference – volume: 111 start-page: 14 year: 2014 end-page: 14 ident: br1080 article-title: Bioreplicated visual features of nanofabricated buprestid beetle decoys evoke stereotypical male mating flights publication-title: Proc. Natl. Acad. Sci. – start-page: 522 year: 2019 end-page: 526 ident: br1360 article-title: A game-theoretic framework for dynamic cyber deception in Internet of battlefield things publication-title: Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services – start-page: 201 year: 2012 end-page: 220 ident: br1310 article-title: Game theoretic model of strategic honeypot selection in computer networks publication-title: International Conference on Decision and Game Theory for Security – volume: 19 start-page: 3438 year: 2022 end-page: 3452 ident: br1980 article-title: Honeypot allocation for cyber deception under uncertainty publication-title: IEEE Trans. Netw. Serv. Manag. – volume: 16 year: 2022 ident: br1890 article-title: Early intrusion detection system using honeypot for industrial control networks publication-title: Results Eng. – start-page: 1 year: 2017 end-page: 9 ident: br0900 article-title: A novel sdn based stealthy tcp connection handover mechanism for hybrid honeypot systems publication-title: 2017 IEEE Conference on Network Softwarization (NetSoft) – volume: 10 start-page: 104 year: 2022 end-page: 104 ident: br1760 article-title: Honeycar: a framework to configure honeypot vulnerabilities on the Internet of vehicles publication-title: IEEE Access – start-page: 1 year: 2021 end-page: 7 ident: br1010 article-title: A novel two-factor honeytoken authentication mechanism publication-title: 2021 International Conference on Computer Communications and Networks (ICCCN) – start-page: 41 year: 2022 end-page: 57 ident: br1700 article-title: Adaptive cyberdefense with deception: a human–ai cognitive approach publication-title: Cyber Deception: Techniques, Strategies, and Human Aspects – volume: 32 start-page: 1384 year: 2009 end-page: 1399 ident: br0870 article-title: An auto-responsive honeypot architecture for dynamic resource allocation and qos adaptation in ddos attacked networks publication-title: Comput. Commun. – volume: 106 start-page: 505 year: 2019 end-page: 519 ident: br2030 article-title: Improving resources management in network virtualization by utilizing a software-based network publication-title: Wirel. Pers. Commun. – start-page: 129 year: 2011 end-page: 136 ident: br1120 article-title: Game theory-based defense mechanisms against ddos attacks on tcp/tcp-friendly flows publication-title: 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS) – start-page: 1417 year: 2017 end-page: 1421 ident: br0090 article-title: Feature selection and intrusion detection in cloud environment based on machine learning algorithms publication-title: 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC) – volume: 52 start-page: 1 year: 2019 end-page: 28 ident: br1610 article-title: A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy publication-title: ACM Comput. Surv. – start-page: 107 year: June 2007 end-page: 113 ident: br1410 article-title: Deception in honeynets: a game-theoretic analysis publication-title: 2007 IEEE SMC Information Assurance and Security Workshop – start-page: 139 year: 2023 end-page: 144 ident: br1770 article-title: Enhancing cyber attribution through behavior similarity detection on Linux shell honeypots with att&ck framework publication-title: 2023 IEEE International Conference on Cryptography, Informatics, and Cybersecurity (ICoCICs) – volume: 26 start-page: 367 year: 2023 end-page: 384 ident: br0060 article-title: Dmaidps: a distributed multi-agent intrusion detection and prevention system for cloud iot environments publication-title: Clust. Comput. – start-page: 77 year: 2016 end-page: 84 ident: br1540 article-title: Designing adaptive deception strategies publication-title: 2016 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) – start-page: 1 year: 2012 end-page: 4 ident: br1200 article-title: Mimicry honeypot: a brief introduction publication-title: 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing – start-page: 587 year: 2023 end-page: 598 ident: br1870 article-title: Honeypot for cybersecurity threat intelligence publication-title: IRC-SET 2022: Proceedings of the 8th IRC Conference on Science, Engineering and Technology, August 2022, Singapore – year: 2018 ident: br0220 article-title: Demystifying deception technology: a survey – volume: 15 start-page: 127 year: 2023 ident: br1800 article-title: A highly interactive honeypot-based approach to network threat management publication-title: Future Internet – year: 2015 ident: br1420 article-title: Deception by design: evidence-based signaling games for network defense – volume: 106 year: 2021 ident: br1170 article-title: Three decades of deception techniques in active cyber defense-retrospect and outlook publication-title: Comput. Secur. – start-page: 742 year: 2022 end-page: 755 ident: br1130 article-title: Interaction matters: a comprehensive analysis and a dataset of hybrid iot/ot honeypots publication-title: Proceedings of the 38th Annual Computer Security Applications Conference – volume: 78 start-page: 3477 year: 2022 end-page: 3499 ident: br1940 article-title: cTMvSDN: improving resource management using combination of Markov-process and tdma in software-defined networking publication-title: J. Supercomput. – volume: 2 start-page: 479 year: 2022 end-page: 486 ident: br1830 article-title: A virtual honeypot framework publication-title: Cent. Asian Res. J. Interdiscip. Stud. – volume: 14 start-page: 1098 year: 2017 end-page: 1112 ident: br0720 article-title: Deceiving network reconnaissance using sdn-based virtual topologies publication-title: IEEE Trans. Netw. Serv. Manag. – start-page: 253 year: 2007 end-page: 258 ident: br0540 article-title: Metrics for measuring the effectiveness of decompilers and obfuscators publication-title: 15th IEEE International Conference on Program Comprehension (ICPC'07) – year: 2023 ident: br1690 article-title: Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement publication-title: ACM Comput. Surv. – year: 2012 ident: br1280 article-title: Performance analysis of cyber deception using probabilistic models – start-page: 1002 year: 2015 end-page: 1009 ident: br0150 article-title: Taxonomy of honeynet solutions publication-title: 2015 SAI Intelligent Systems Conference (IntelliSys) – volume: 40 start-page: 69 year: 2016 ident: br1090 article-title: Shady trick or legitimate tactic-can law enforcement officials use fictitious social media accounts to interact with suspects publication-title: Am. J. Trial Advoc. – year: 2021 ident: br1580 article-title: Architectural Style: Distortions for Deploying and Managing Deception Technologies in Software Systems – year: 2021 ident: br0650 article-title: Generating fake documents using probabilistic logic graphs publication-title: IEEE Trans. Dependable Secure Comput. – volume: 97 year: 2020 ident: br1470 article-title: A differential game method against attacks in heterogeneous honeynet publication-title: Comput. Secur. – year: 2003 ident: br0190 article-title: Intrusion Detection with Snort – year: 2023 ident: br0990 article-title: Hybrid cyber defense strategies using honey-x: a survey publication-title: Comput. Netw. – volume: 17 start-page: 135 year: 2018 end-page: 151 ident: br0830 article-title: Honeycirculator: distributing credential honeytoken for introspection of web-based attack cycle publication-title: Int. J. Inf. Secur. – volume: 12 start-page: 3906 year: 2017 end-page: 3919 ident: br0160 article-title: Enabling an anatomic view to investigate honeypot systems: a survey publication-title: IEEE Syst. J. – volume: 92 year: 2020 ident: br1150 article-title: A review and theoretical explanation of the ‘cyberthreat-intelligence (cti) capability’ that needs to be fostered in information security practitioners and how this can be accomplished publication-title: Comput. Secur. – year: 2022 ident: br2050 article-title: Security Posture: A Systematic Review of Cyber Threats and Proactive Security – start-page: 1 year: 2014 end-page: 12 ident: br0710 article-title: Keeping intruders at large: a graph-theoretic approach to reducing the probability of successful network intrusions publication-title: 2014 11th International Conference on Security and Cryptography (SECRYPT) – start-page: 1 year: 2012 end-page: 5 ident: br0310 article-title: Hybrid honeypot framework for malware collection and analysis publication-title: 2012 IEEE 7th International Conference on Industrial and Information Systems (ICIIS) – volume: 102 year: 2022 ident: br1530 article-title: Using honeypots to model botnet attacks on the Internet of medical things publication-title: Comput. Electr. Eng. – volume: 34 start-page: 140 year: 2020 end-page: 147 ident: br2040 article-title: Ai for beyond 5g networks: a cyber-security defense or offense enabler? publication-title: IEEE Netw. – volume: 4 start-page: 63 year: 2012 ident: br0930 article-title: A survey: recent advances and future trends in honeypot research publication-title: Int. J. Comput. Netw. Inf. Secur. – start-page: 269 year: 2023 end-page: 278 ident: br1960 article-title: Sdn-based cyber deception deployment for proactive defense strategy using honey of things and cyber threat intelligence publication-title: International Conference on Intelligence of Things – year: 2023 ident: br0080 article-title: Towards data security assessments using an ids security model for cyber-physical smart cities publication-title: Inf. Sci. – volume: 2 start-page: 25 year: 2007 end-page: 36 ident: br0910 article-title: Defending cyberspace with fake honeypots publication-title: J. Comput. – volume: vol. 2 year: 2017 ident: br0780 article-title: Enhancing security using honeywords publication-title: International Journal of Innovative Research and Creative Technology – start-page: 1 year: 2020 end-page: 6 ident: br1350 article-title: Software diversity for cyber deception publication-title: GLOBECOM 2020-2020 IEEE Global Communications Conference – start-page: 204 year: 2017 end-page: 207 ident: br0370 article-title: New techniques of malware detection using ftp honeypot systems publication-title: 2017 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus) – volume: 2022 start-page: 1 year: 2022 end-page: 13 ident: br1880 article-title: Multi-cloud integration security framework using honeypots publication-title: Mob. Inf. Syst. – volume: 4 start-page: 1162 year: 2011 end-page: 1172 ident: br1390 article-title: A game theoretic investigation of deception in network security publication-title: Secur. Commun. Netw. – start-page: 93 year: 2012 end-page: 94 ident: br0820 article-title: Software decoys for insider threat publication-title: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security – start-page: 410 year: 2010 end-page: 417 ident: br0300 article-title: Honeyware: a web-based low interaction client honeypot publication-title: 2010 Third International Conference on Software Testing, Verification, and Validation Workshops – start-page: 915 year: 2009 end-page: 921 ident: br0560 article-title: Design considerations for a honeypot for sql injection attacks publication-title: 2009 IEEE 34th Conference on Local Computer Networks – volume: 2 start-page: 154 year: 2022 end-page: 190 ident: br0500 article-title: Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: a survey publication-title: J. Cybersecur. Priv. – start-page: 155 year: 2022 end-page: 169 ident: br1790 article-title: Attacker attribution via characteristics inference using honeypot data publication-title: International Conference on Network and System Security – start-page: 25 year: 2016 end-page: 52 ident: br0130 article-title: Cyber security deception publication-title: Cyber Deception – start-page: 1 year: 2019 end-page: 9 ident: br0240 article-title: Current state of honeypots and deception strategies in cybersecurity publication-title: 2019 11th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) – start-page: 228 year: 2015 end-page: 249 ident: br1340 article-title: Approximate solutions for attack graph games with imperfect information publication-title: International Conference on Decision and Game Theory for Security – year: 2022 ident: br2110 article-title: Anomaly Detection Framework and Deep Learning Techniques for Zero-Day Attack in Container Based Environment – volume: 13 start-page: 597 year: 2021 ident: br1220 article-title: Threat defense: cyber deception approach and education for resilience in hybrid threats model publication-title: Symmetry – start-page: 167 year: 1989 end-page: 177 ident: br1490 article-title: Nash equilibrium publication-title: Game Theory – start-page: 1 year: Dec 2015 end-page: 6 ident: br0200 article-title: Optimized virtual honeynet with implementation of host machine as honeywall publication-title: 2015 Annual IEEE India Conference (INDICON) – volume: vol. 1 start-page: 758 year: 2020 end-page: 762 ident: br0590 article-title: Research on Building Exploitable Vulnerability Database for Cloud-Native App publication-title: 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) – start-page: 1 year: 2022 end-page: 3 ident: br2010 article-title: Demo paper: caught in my radio net-experiment with honeypots in radio access networks publication-title: 2022 25th Conference on Innovation in Clouds, Internet and Networks (ICIN) – year: 2022 ident: br1230 article-title: Modeling Deception for Cyber Security – volume: 37 start-page: 683 year: 2019 end-page: 697 ident: br0440 article-title: Honeydoc: an efficient honeypot architecture enabling all-round design publication-title: IEEE J. Sel. Areas Commun. – year: 2007 ident: br0270 article-title: Characterizing the irc-based botnet phenomenon – year: 2013 ident: br1070 article-title: Bait and Snitch: Defending Computer Systems with Decoys – year: 2022 ident: br2070 article-title: Apache Log4j Logging Framework and Its Vulnerability – volume: 51 start-page: 1 year: 2018 end-page: 36 ident: br1630 article-title: Deception techniques in computer security: a research perspective publication-title: ACM Comput. Surv. – start-page: 1 year: 2016 ident: 10.1016/j.cose.2024.103792_br0170 article-title: Honeymix: toward sdn-based intelligent honeynet – volume: 116 start-page: 76 year: 2021 ident: 10.1016/j.cose.2024.103792_br1480 article-title: A theoretical method to evaluate honeynet potency publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2020.08.021 – volume: 11 start-page: 418 issue: 6 year: 2020 ident: 10.1016/j.cose.2024.103792_br0250 article-title: A review on honeypot-based botnet detection models for smart factory publication-title: Int. J. Adv. Comput. Sci. Appl. – volume: 8 start-page: 2474 issue: 5 year: 2017 ident: 10.1016/j.cose.2024.103792_br0510 article-title: Strategic honeypot game model for distributed denial of service attacks in the smart grid publication-title: IEEE Trans. Smart Grid doi: 10.1109/TSG.2017.2670144 – year: 2023 ident: 10.1016/j.cose.2024.103792_br0990 article-title: Hybrid cyber defense strategies using honey-x: a survey publication-title: Comput. Netw. doi: 10.1016/j.comnet.2023.109776 – volume: 24 start-page: 522 issue: 3 year: 2016 ident: 10.1016/j.cose.2024.103792_br0360 article-title: Iotpot: a novel honeypot for revealing current iot threats publication-title: J. Inf. Process. – year: 2021 ident: 10.1016/j.cose.2024.103792_br0650 article-title: Generating fake documents using probabilistic logic graphs publication-title: IEEE Trans. Dependable Secure Comput. – ident: 10.1016/j.cose.2024.103792_br0220 – year: 2022 ident: 10.1016/j.cose.2024.103792_br2110 – volume: 16 year: 2022 ident: 10.1016/j.cose.2024.103792_br1890 article-title: Early intrusion detection system using honeypot for industrial control networks publication-title: Results Eng. doi: 10.1016/j.rineng.2022.100576 – start-page: 375 year: 2019 ident: 10.1016/j.cose.2024.103792_br0450 article-title: Dynamic virtual network honeypot – volume: 130 year: 2023 ident: 10.1016/j.cose.2024.103792_br1710 article-title: Cyber expert feedback: experiences, expectations, and opinions about cyber deception publication-title: Comput. Secur. doi: 10.1016/j.cose.2023.103268 – start-page: 77 year: 2016 ident: 10.1016/j.cose.2024.103792_br1540 article-title: Designing adaptive deception strategies – year: 2022 ident: 10.1016/j.cose.2024.103792_br1230 – volume: 52 start-page: 1 issue: 4 year: 2019 ident: 10.1016/j.cose.2024.103792_br1610 article-title: A game-theoretic taxonomy and survey of defensive deception for cybersecurity and privacy publication-title: ACM Comput. Surv. doi: 10.1145/3337772 – volume: 5 start-page: 178 issue: 1 year: 1982 ident: 10.1016/j.cose.2024.103792_br1600 article-title: Toward a general theory of deception publication-title: J. Strateg. Stud. doi: 10.1080/01402398208437106 – volume: 2 start-page: 479 issue: 5 year: 2022 ident: 10.1016/j.cose.2024.103792_br1830 article-title: A virtual honeypot framework publication-title: Cent. Asian Res. J. Interdiscip. Stud. – start-page: 156 year: 2018 ident: 10.1016/j.cose.2024.103792_br1300 article-title: Strategic defense and attack in deception based network security – volume: 34 start-page: 140 issue: 6 year: 2020 ident: 10.1016/j.cose.2024.103792_br2040 article-title: Ai for beyond 5g networks: a cyber-security defense or offense enabler? publication-title: IEEE Netw. doi: 10.1109/MNET.011.2000088 – ident: 10.1016/j.cose.2024.103792_br0420 – volume: 22 start-page: 8046 issue: 20 year: 2022 ident: 10.1016/j.cose.2024.103792_br1900 article-title: Interleaved honeypot-framing model with secure mac policies for wireless sensor networks publication-title: Sensors doi: 10.3390/s22208046 – start-page: 741 year: 2009 ident: 10.1016/j.cose.2024.103792_br0600 article-title: Self adaptive high interaction honeypots driven by game theory – volume: 13 start-page: 284 issue: 2 year: 2016 ident: 10.1016/j.cose.2024.103792_br0790 article-title: Achieving flatness: selecting the honeywords from existing user passwords publication-title: IEEE Trans. Dependable Secure Comput. doi: 10.1109/TDSC.2015.2406707 – start-page: 73 year: 2016 ident: 10.1016/j.cose.2024.103792_br0850 article-title: Honey pot: a major technique for intrusion detection – volume: 13 start-page: 210 issue: 4 year: 2022 ident: 10.1016/j.cose.2024.103792_br1780 article-title: Systematic review of graphical visual methods in honeypot attack data analysis publication-title: J. Inf. Secur. – volume: 975 start-page: 8887 year: 2013 ident: 10.1016/j.cose.2024.103792_br0320 article-title: Design and implementation of a medium interaction honeypot publication-title: Int. J. Comput. Appl. – volume: 114 year: 2022 ident: 10.1016/j.cose.2024.103792_br1670 article-title: Don't get stung, cover your ics in honey: how do honeypots fit within industrial control system security publication-title: Comput. Secur. doi: 10.1016/j.cose.2021.102598 – start-page: 127 year: 2016 ident: 10.1016/j.cose.2024.103792_br0350 article-title: Implementation of low interaction web server honeypot using cubieboard – volume: 141 start-page: 339 year: 2023 ident: 10.1016/j.cose.2024.103792_br1840 article-title: The dag blockchain: a secure edge assisted honeypot for attack detection and multi-controller based load balancing in sdn 5g publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2022.11.008 – start-page: 2013 year: 2013 ident: 10.1016/j.cose.2024.103792_br1160 – start-page: 1 year: 2019 ident: 10.1016/j.cose.2024.103792_br1260 article-title: Resiliency under strategic foresight: the effects of cybersecurity management and enterprise risk management alignment – start-page: 228 year: 2015 ident: 10.1016/j.cose.2024.103792_br1340 article-title: Approximate solutions for attack graph games with imperfect information – start-page: 16 year: 2015 ident: 10.1016/j.cose.2024.103792_br0340 article-title: Intercept+: Sdn support for live migration-based honeypots – start-page: 1 year: 2021 ident: 10.1016/j.cose.2024.103792_br0740 article-title: An adaptive honeypot using q-learning with severity analyzer publication-title: J. Ambient Intell. Humaniz. Comput. – volume: 26 start-page: 367 issue: 1 year: 2023 ident: 10.1016/j.cose.2024.103792_br0060 article-title: Dmaidps: a distributed multi-agent intrusion detection and prevention system for cloud iot environments publication-title: Clust. Comput. doi: 10.1007/s10586-022-03621-3 – start-page: 742 year: 2022 ident: 10.1016/j.cose.2024.103792_br1130 article-title: Interaction matters: a comprehensive analysis and a dataset of hybrid iot/ot honeypots – year: 2023 ident: 10.1016/j.cose.2024.103792_br1140 – volume: 2 start-page: 25 issue: 2 year: 2007 ident: 10.1016/j.cose.2024.103792_br0910 article-title: Defending cyberspace with fake honeypots publication-title: J. Comput. doi: 10.4304/jcp.2.2.25-36 – year: 2022 ident: 10.1016/j.cose.2024.103792_br2070 – volume: 9 start-page: 415 issue: 3 year: 2020 ident: 10.1016/j.cose.2024.103792_br0480 article-title: Reputation management using honeypots for intrusion detection in the Internet of things publication-title: Electronics doi: 10.3390/electronics9030415 – start-page: 41 year: 2022 ident: 10.1016/j.cose.2024.103792_br1700 article-title: Adaptive cyberdefense with deception: a human–ai cognitive approach – volume: vol. 2 year: 2017 ident: 10.1016/j.cose.2024.103792_br0780 article-title: Enhancing security using honeywords – volume: 2023 year: 2023 ident: 10.1016/j.cose.2024.103792_br1730 article-title: A comprehensive survey on machine learning-based intrusion detection systems for secure communication in Internet of things publication-title: Comput. Intell. Neurosci. doi: 10.1155/2023/8981988 – start-page: 1 year: 2015 ident: 10.1016/j.cose.2024.103792_br0200 article-title: Optimized virtual honeynet with implementation of host machine as honeywall – start-page: 93 year: 2012 ident: 10.1016/j.cose.2024.103792_br0820 article-title: Software decoys for insider threat – start-page: 195 year: 2017 ident: 10.1016/j.cose.2024.103792_br0580 article-title: Increasing the attractiveness of false objects of attack on the web-servers – start-page: 25 year: 2016 ident: 10.1016/j.cose.2024.103792_br0130 article-title: Cyber security deception – volume: 12 start-page: 2993 issue: 2 year: 2021 ident: 10.1016/j.cose.2024.103792_br0490 article-title: An intelligent botnet blocking approach in software defined networks using honeypots publication-title: J. Ambient Intell. Humaniz. Comput. doi: 10.1007/s12652-020-02461-6 – year: 2023 ident: 10.1016/j.cose.2024.103792_br1690 article-title: Implementing data exfiltration defense in situ: a survey of countermeasures and human involvement publication-title: ACM Comput. Surv. doi: 10.1145/3582077 – start-page: 1 year: 2022 ident: 10.1016/j.cose.2024.103792_br1910 article-title: Icspot: a high-interaction honeypot for industrial control systems – year: 2023 ident: 10.1016/j.cose.2024.103792_br1740 – year: 2021 ident: 10.1016/j.cose.2024.103792_br1580 – start-page: 341 year: 2018 ident: 10.1016/j.cose.2024.103792_br0750 article-title: Using reinforcement learning to conceal honeypot functionality – volume: 37 start-page: 683 issue: 3 year: 2019 ident: 10.1016/j.cose.2024.103792_br0440 article-title: Honeydoc: an efficient honeypot architecture enabling all-round design publication-title: IEEE J. Sel. Areas Commun. doi: 10.1109/JSAC.2019.2894307 – year: 2022 ident: 10.1016/j.cose.2024.103792_br2050 – start-page: 1 year: 2021 ident: 10.1016/j.cose.2024.103792_br1010 article-title: A novel two-factor honeytoken authentication mechanism – volume: 50 year: 2023 ident: 10.1016/j.cose.2024.103792_br1660 article-title: Flow based containerized honeypot approach for network traffic analysis: an empirical study publication-title: Comput. Sci. Rev. doi: 10.1016/j.cosrev.2023.100600 – volume: 4 start-page: 1 year: 2014 ident: 10.1016/j.cose.2024.103792_br1000 article-title: Social network attack simulation with honeytokens publication-title: Soc. Netw. Anal. Min. doi: 10.1007/s13278-014-0221-5 – volume: 92 year: 2020 ident: 10.1016/j.cose.2024.103792_br1150 article-title: A review and theoretical explanation of the ‘cyberthreat-intelligence (cti) capability’ that needs to be fostered in information security practitioners and how this can be accomplished publication-title: Comput. Secur. doi: 10.1016/j.cose.2020.101761 – start-page: 127 year: 2014 ident: 10.1016/j.cose.2024.103792_br1560 article-title: Planning and integrating deception into computer security defenses – volume: vol. 1 start-page: 69 year: 2010 ident: 10.1016/j.cose.2024.103792_br0290 article-title: A malware sample capturing and tracking system – start-page: 167 year: 1989 ident: 10.1016/j.cose.2024.103792_br1490 article-title: Nash equilibrium – start-page: 131 year: 2011 ident: 10.1016/j.cose.2024.103792_br0770 article-title: Honeygen: an automated honeytokens generator – year: 2022 ident: 10.1016/j.cose.2024.103792_br1650 – start-page: 1 year: 2020 ident: 10.1016/j.cose.2024.103792_br1350 article-title: Software diversity for cyber deception – start-page: 1 year: 2022 ident: 10.1016/j.cose.2024.103792_br2010 article-title: Demo paper: caught in my radio net-experiment with honeypots in radio access networks – start-page: 139 year: 2023 ident: 10.1016/j.cose.2024.103792_br1770 article-title: Enhancing cyber attribution through behavior similarity detection on Linux shell honeypots with att&ck framework – volume: 97 year: 2020 ident: 10.1016/j.cose.2024.103792_br1470 article-title: A differential game method against attacks in heterogeneous honeynet publication-title: Comput. Secur. doi: 10.1016/j.cose.2020.101870 – start-page: 1 year: 2012 ident: 10.1016/j.cose.2024.103792_br0310 article-title: Hybrid honeypot framework for malware collection and analysis – start-page: 441 year: 2018 ident: 10.1016/j.cose.2024.103792_br0730 article-title: Qrassh-a self-adaptive ssh honeypot driven by q-learning – year: 2016 ident: 10.1016/j.cose.2024.103792_br0140 – volume: vol. 801 start-page: 012057 year: 2017 ident: 10.1016/j.cose.2024.103792_br0550 article-title: Enhancing honeypot deception capability through network service fingerprinting – start-page: 115 year: 2018 ident: 10.1016/j.cose.2024.103792_br1440 article-title: Optimal placement of honeypots for network defense – volume: vol. 6 year: 2006 ident: 10.1016/j.cose.2024.103792_br0620 article-title: Measuring the effectiveness of honeypot counter-counterdeception – start-page: 107 year: 2007 ident: 10.1016/j.cose.2024.103792_br1410 article-title: Deception in honeynets: a game-theoretic analysis – volume: 13 start-page: 597 issue: 4 year: 2021 ident: 10.1016/j.cose.2024.103792_br1220 article-title: Threat defense: cyber deception approach and education for resilience in hybrid threats model publication-title: Symmetry doi: 10.3390/sym13040597 – start-page: 1 year: 2020 ident: 10.1016/j.cose.2024.103792_br0470 article-title: A scalable high-interaction physical honeypot framework for programmable logic controller – volume: 201 year: 2022 ident: 10.1016/j.cose.2024.103792_br1680 article-title: Honeyboost: boosting honeypot performance with data fusion and anomaly detection publication-title: Expert Syst. Appl. doi: 10.1016/j.eswa.2022.117073 – year: 2015 ident: 10.1016/j.cose.2024.103792_br1330 article-title: Optimal network security hardening using attack graph games – start-page: 21 year: 2015 ident: 10.1016/j.cose.2024.103792_br1290 article-title: Probabilistic performance analysis of moving target and deception reconnaissance defenses – volume: 30 start-page: 737 issue: 6 year: 2009 ident: 10.1016/j.cose.2024.103792_br0530 article-title: Refined metrics for measuring ideation effectiveness publication-title: Des. Stud. doi: 10.1016/j.destud.2009.07.002 – volume: 64 year: 2015 ident: 10.1016/j.cose.2024.103792_br1520 article-title: Cyber denial, deception and counter deception publication-title: Adv. Inf. Secur. – year: 2017 ident: 10.1016/j.cose.2024.103792_br0390 – start-page: 155 year: 2022 ident: 10.1016/j.cose.2024.103792_br1790 article-title: Attacker attribution via characteristics inference using honeypot data – year: 2003 ident: 10.1016/j.cose.2024.103792_br0190 – year: 2023 ident: 10.1016/j.cose.2024.103792_br0080 article-title: Towards data security assessments using an ids security model for cyber-physical smart cities publication-title: Inf. Sci. doi: 10.1016/j.ins.2023.119530 – volume: 2022 start-page: 1 year: 2022 ident: 10.1016/j.cose.2024.103792_br1880 article-title: Multi-cloud integration security framework using honeypots publication-title: Mob. Inf. Syst. – start-page: 587 year: 2023 ident: 10.1016/j.cose.2024.103792_br1870 article-title: Honeypot for cybersecurity threat intelligence – start-page: 201 year: 2012 ident: 10.1016/j.cose.2024.103792_br1310 article-title: Game theoretic model of strategic honeypot selection in computer networks – start-page: 65 year: 2019 ident: 10.1016/j.cose.2024.103792_br0520 article-title: Behavioural analysis of recent ransomwares and prediction of future attacks by polymorphic and metamorphic ransomware – start-page: 1417 year: 2017 ident: 10.1016/j.cose.2024.103792_br0090 article-title: Feature selection and intrusion detection in cloud environment based on machine learning algorithms – start-page: 502 year: 2020 ident: 10.1016/j.cose.2024.103792_br1370 article-title: Honeypot allocation over attack graphs in cyber deception games – start-page: 129 year: 2011 ident: 10.1016/j.cose.2024.103792_br1120 article-title: Game theory-based defense mechanisms against ddos attacks on tcp/tcp-friendly flows – start-page: 51 year: 2009 ident: 10.1016/j.cose.2024.103792_br1050 article-title: Baiting inside attackers using decoy documents – volume: 18 start-page: 1 issue: 3 year: 2016 ident: 10.1016/j.cose.2024.103792_br0940 article-title: Behavioral study of users when interacting with active honeytokens publication-title: ACM Trans. Inf. Syst. Secur. doi: 10.1145/2854152 – start-page: 1107 year: 2022 ident: 10.1016/j.cose.2024.103792_br1950 article-title: Topotrust: a blockchain-based trustless and secure topology discovery in sdns – start-page: 13 year: 2012 ident: 10.1016/j.cose.2024.103792_br0860 article-title: Fast dynamic extracted honeypots in cloud computing – start-page: 321 year: 2007 ident: 10.1016/j.cose.2024.103792_br0960 article-title: Honeypots: concepts, approaches, and challenges – start-page: 1 year: 2012 ident: 10.1016/j.cose.2024.103792_br1200 article-title: Mimicry honeypot: a brief introduction – volume: 6 start-page: 39 issue: 1 year: 2022 ident: 10.1016/j.cose.2024.103792_br1810 article-title: Sd-honeypot integration for mitigating ddos attack using machine learning approaches publication-title: JOIV: Int. J. Inform. Vis. doi: 10.30630/joiv.6.1.853 – start-page: 337 year: 2022 ident: 10.1016/j.cose.2024.103792_br1040 article-title: An approach to generate realistic http parameters for application layer deception – volume: 106 year: 2021 ident: 10.1016/j.cose.2024.103792_br1170 article-title: Three decades of deception techniques in active cyber defense-retrospect and outlook publication-title: Comput. Secur. doi: 10.1016/j.cose.2021.102288 – volume: 22 start-page: 2194 issue: 6 year: 2022 ident: 10.1016/j.cose.2024.103792_br1100 article-title: Leveraging computational intelligence techniques for defensive deception: a review, recent advances, open problems and future directions publication-title: Sensors doi: 10.3390/s22062194 – start-page: 101 year: 2022 ident: 10.1016/j.cose.2024.103792_br0950 article-title: Honeysweeper: towards stealthy honeytoken fingerprinting techniques – year: 2021 ident: 10.1016/j.cose.2024.103792_br0260 – volume: 78 start-page: 3477 year: 2022 ident: 10.1016/j.cose.2024.103792_br1940 article-title: cTMvSDN: improving resource management using combination of Markov-process and tdma in software-defined networking publication-title: J. Supercomput. doi: 10.1007/s11227-021-03871-9 – start-page: 81 year: 2023 ident: 10.1016/j.cose.2024.103792_br0120 article-title: A mathematical model for analyzing honeynets and their cyber deception techniques – ident: 10.1016/j.cose.2024.103792_br1420 – start-page: 1 year: 2014 ident: 10.1016/j.cose.2024.103792_br0330 article-title: The art of false alarms in the game of deception: leveraging fake honeypots for enhanced security – volume: 10 start-page: 104671 year: 2022 ident: 10.1016/j.cose.2024.103792_br1760 article-title: Honeycar: a framework to configure honeypot vulnerabilities on the Internet of vehicles publication-title: IEEE Access doi: 10.1109/ACCESS.2022.3210117 – volume: 4 start-page: 1 issue: 1 year: 2023 ident: 10.1016/j.cose.2024.103792_br1920 article-title: The role of machine learning in cybersecurity publication-title: Digit. Treats Res. Pract. doi: 10.1145/3545574 – volume: 4 start-page: 1162 issue: 10 year: 2011 ident: 10.1016/j.cose.2024.103792_br1390 article-title: A game theoretic investigation of deception in network security publication-title: Secur. Commun. Netw. doi: 10.1002/sec.242 – start-page: 1127 year: 2021 ident: 10.1016/j.cose.2024.103792_br0210 article-title: Examining the efficacy of decoy-based and psychological cyber deception – start-page: 51 year: 2019 ident: 10.1016/j.cose.2024.103792_br0430 article-title: Characterizing background noise in ics traffic through a set of low interaction honeypots – start-page: 81 year: 2015 ident: 10.1016/j.cose.2024.103792_br1320 article-title: Game-theoretic foundations for the strategic use of honeypots in network security – start-page: 1 year: 2020 ident: 10.1016/j.cose.2024.103792_br1060 article-title: Towards a believable decoy system: replaying network activities from real system – volume: 32 start-page: 1384 issue: 12 year: 2009 ident: 10.1016/j.cose.2024.103792_br0870 article-title: An auto-responsive honeypot architecture for dynamic resource allocation and qos adaptation in ddos attacked networks publication-title: Comput. Commun. doi: 10.1016/j.comcom.2009.03.005 – year: 2022 ident: 10.1016/j.cose.2024.103792_br1020 – start-page: 173 year: 2015 ident: 10.1016/j.cose.2024.103792_br1190 article-title: The human factor in cybersecurity: robust & intelligent defense – volume: 19 start-page: 3438 issue: 3 year: 2022 ident: 10.1016/j.cose.2024.103792_br1980 article-title: Honeypot allocation for cyber deception under uncertainty publication-title: IEEE Trans. Netw. Serv. Manag. doi: 10.1109/TNSM.2022.3179965 – volume: 4 start-page: 373 year: 2015 ident: 10.1016/j.cose.2024.103792_br0670 article-title: Improving deception capability in honeynet through data manipulation publication-title: J. Internet Technol. Secur. Trans. doi: 10.20533/jitst.2046.3723.2015.0047 – year: 2021 ident: 10.1016/j.cose.2024.103792_br1250 – volume: 106 start-page: 505 issue: 2 year: 2019 ident: 10.1016/j.cose.2024.103792_br2030 article-title: Improving resources management in network virtualization by utilizing a software-based network publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-019-06176-6 – year: 2023 ident: 10.1016/j.cose.2024.103792_br1720 – start-page: 7 year: 2009 ident: 10.1016/j.cose.2024.103792_br1380 article-title: An attacker-defender game for honeynets – year: 2023 ident: 10.1016/j.cose.2024.103792_br1990 article-title: Reinforcement learning-based slice isolation against ddos attacks in beyond 5g networks publication-title: IEEE Trans. Netw. Serv. Manag. doi: 10.1109/TNSM.2023.3254581 – volume: 13 start-page: 1437 issue: 1 year: 2023 ident: 10.1016/j.cose.2024.103792_br1640 article-title: Containerized cloud-based honeypot deception for tracking attackers publication-title: Sci. Rep. doi: 10.1038/s41598-023-28613-0 – volume: 75 start-page: 8312 year: 2019 ident: 10.1016/j.cose.2024.103792_br0980 article-title: Detecting and confronting flash attacks from iot botnets publication-title: J. Supercomput. doi: 10.1007/s11227-019-03005-2 – start-page: 410 year: 2010 ident: 10.1016/j.cose.2024.103792_br0300 article-title: Honeyware: a web-based low interaction client honeypot – volume: vol. 11 start-page: 145 year: 2013 ident: 10.1016/j.cose.2024.103792_br0760 article-title: Honeywords: making password-cracking detectable – start-page: 01 year: 2022 ident: 10.1016/j.cose.2024.103792_br2120 article-title: Defense-in-depth security strategy in log4j vulnerability analysis – start-page: 4173 year: 2022 ident: 10.1016/j.cose.2024.103792_br0040 article-title: A cost-effective mtd approach for ddos attacks in software-defined networks – start-page: 1 year: 2020 ident: 10.1016/j.cose.2024.103792_br0970 article-title: Towards systematic honeytoken fingerprinting – volume: 122 year: 2022 ident: 10.1016/j.cose.2024.103792_br1850 article-title: Use of cyber attack and defense agents in cyber ranges: a case study publication-title: Comput. Secur. doi: 10.1016/j.cose.2022.102892 – volume: 23 start-page: 2460 issue: 4 year: 2021 ident: 10.1016/j.cose.2024.103792_br1240 article-title: A survey of defensive deception: approaches using game theory and machine learning publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/COMST.2021.3102874 – volume: 18 start-page: 667 year: 2022 ident: 10.1016/j.cose.2024.103792_br0030 article-title: SCEMA: an SDN-oriented cost-effective edge-based MTD approach publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2022.3220939 – start-page: 93 year: 2018 ident: 10.1016/j.cose.2024.103792_br0230 article-title: Iot honeypot: a review from researcher's perspective – start-page: 1 year: 2017 ident: 10.1016/j.cose.2024.103792_br0380 article-title: Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypot – volume: 50 start-page: 80 issue: 7 year: 2017 ident: 10.1016/j.cose.2024.103792_br0010 article-title: Ddos in the iot: Mirai and other botnets publication-title: Computer doi: 10.1109/MC.2017.201 – start-page: 75 year: 2022 ident: 10.1016/j.cose.2024.103792_br1750 article-title: Performance evaluation of intrusion detection system performance for traffic anomaly detection based on active ip reputation rules – start-page: 105 year: 2020 ident: 10.1016/j.cose.2024.103792_br0050 article-title: Identification and classification of cyber threats through ssh honeypot systems – start-page: 1 year: 2014 ident: 10.1016/j.cose.2024.103792_br0710 article-title: Keeping intruders at large: a graph-theoretic approach to reducing the probability of successful network intrusions – start-page: 253 year: 2007 ident: 10.1016/j.cose.2024.103792_br0540 article-title: Metrics for measuring the effectiveness of decompilers and obfuscators – start-page: 1002 year: 2015 ident: 10.1016/j.cose.2024.103792_br0150 article-title: Taxonomy of honeynet solutions – volume: 12 start-page: 3906 issue: 4 year: 2017 ident: 10.1016/j.cose.2024.103792_br0160 article-title: Enabling an anatomic view to investigate honeypot systems: a survey publication-title: IEEE Syst. J. doi: 10.1109/JSYST.2017.2762161 – volume: 17 start-page: 135 issue: 2 year: 2018 ident: 10.1016/j.cose.2024.103792_br0830 article-title: Honeycirculator: distributing credential honeytoken for introspection of web-based attack cycle publication-title: Int. J. Inf. Secur. doi: 10.1007/s10207-017-0361-5 – start-page: 6 year: 2016 ident: 10.1016/j.cose.2024.103792_br0800 article-title: Defeating the database adversary using deception - a mysql database honeypot – volume: 26 start-page: 599 issue: 1 year: 2023 ident: 10.1016/j.cose.2024.103792_br0070 article-title: A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things publication-title: Clust. Comput. doi: 10.1007/s10586-022-03629-9 – year: 2022 ident: 10.1016/j.cose.2024.103792_br2060 – volume: 4 start-page: 119 issue: 2 year: 2007 ident: 10.1016/j.cose.2024.103792_br0680 article-title: Fast worm containment using feedback control publication-title: IEEE Trans. Dependable Secure Comput. doi: 10.1109/TDSC.2007.1002 – volume: 110 start-page: 1057 issue: 2 year: 2020 ident: 10.1016/j.cose.2024.103792_br1970 article-title: Providing a way to create balance between reliability and delays in sdn networks by using the appropriate placement of controllers publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-019-06773-5 – start-page: 1 year: 2020 ident: 10.1016/j.cose.2024.103792_br0570 article-title: Neuralpot: an industrial honeypot implementation based on deep neural networks – volume: 9 start-page: 911 year: 2009 ident: 10.1016/j.cose.2024.103792_br0280 article-title: Phoneyc: a virtual client honeypot publication-title: LEET – volume: 15 start-page: 127 issue: 4 year: 2023 ident: 10.1016/j.cose.2024.103792_br1800 article-title: A highly interactive honeypot-based approach to network threat management publication-title: Future Internet doi: 10.3390/fi15040127 – volume: 14 start-page: 1871 issue: 7 year: 2018 ident: 10.1016/j.cose.2024.103792_br1430 article-title: Modeling and analysis of leaky deception using signaling games with evidence publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2018.2886472 – year: 2023 ident: 10.1016/j.cose.2024.103792_br2080 – volume: 36 start-page: 165 issue: 6 year: 2022 ident: 10.1016/j.cose.2024.103792_br2000 article-title: Ai-based autonomic and scalable security management architecture for secure network slicing in b5g publication-title: IEEE Netw. doi: 10.1109/MNET.104.2100495 – volume: 14 start-page: 1098 issue: 4 year: 2017 ident: 10.1016/j.cose.2024.103792_br0720 article-title: Deceiving network reconnaissance using sdn-based virtual topologies publication-title: IEEE Trans. Netw. Serv. Manag. doi: 10.1109/TNSM.2017.2724239 – start-page: 196 year: 2019 ident: 10.1016/j.cose.2024.103792_br1460 article-title: Adaptive honeypot engagement through reinforcement learning of semi-Markov decision processes – volume: 5 start-page: 232 issue: 3 year: 2023 ident: 10.1016/j.cose.2024.103792_br1930 article-title: An in-depth evaluation of hybrid approaches in soft computing for the identification of social engineering publication-title: J. Soft Comput. Paradig. doi: 10.36548/jscp.2023.3.002 – year: 2007 ident: 10.1016/j.cose.2024.103792_br0270 – volume: 102 year: 2022 ident: 10.1016/j.cose.2024.103792_br1530 article-title: Using honeypots to model botnet attacks on the Internet of medical things publication-title: Comput. Electr. Eng. doi: 10.1016/j.compeleceng.2022.108212 – volume: vol. 1 start-page: 758 year: 2020 ident: 10.1016/j.cose.2024.103792_br0590 article-title: Research on Building Exploitable Vulnerability Database for Cloud-Native App – volume: 40 start-page: 69 year: 2016 ident: 10.1016/j.cose.2024.103792_br1090 article-title: Shady trick or legitimate tactic-can law enforcement officials use fictitious social media accounts to interact with suspects publication-title: Am. J. Trial Advoc. – volume: 2 start-page: 154 issue: 1 year: 2022 ident: 10.1016/j.cose.2024.103792_br0500 article-title: Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: a survey publication-title: J. Cybersecur. Priv. doi: 10.3390/jcp2010010 – volume: 51 start-page: 1 issue: 4 year: 2018 ident: 10.1016/j.cose.2024.103792_br1630 article-title: Deception techniques in computer security: a research perspective publication-title: ACM Comput. Surv. doi: 10.1145/3214305 – start-page: 915 year: 2009 ident: 10.1016/j.cose.2024.103792_br0560 article-title: Design considerations for a honeypot for sql injection attacks – year: 2020 ident: 10.1016/j.cose.2024.103792_br0460 article-title: D-fri-honeypot: a secure sting operation for hacking the hackers using dynamic fuzzy rule interpolation publication-title: IEEE Trans. Emerg. Top. Comput. Intell. doi: 10.1109/TETCI.2020.3023447 – start-page: 93 year: 2019 ident: 10.1016/j.cose.2024.103792_br0920 article-title: A survey on honeypots, honeynets and their applications on smart grid – start-page: 204 year: 2017 ident: 10.1016/j.cose.2024.103792_br0370 article-title: New techniques of malware detection using ftp honeypot systems – volume: 11 start-page: 249 issue: 1 year: 2023 ident: 10.1016/j.cose.2024.103792_br2100 article-title: Retaliation against ransomware in cloud-enabled pureos system publication-title: Mathematics doi: 10.3390/math11010249 – start-page: 1 year: 2021 ident: 10.1016/j.cose.2024.103792_br0100 article-title: A lightweight image encryption algorithm for secure communications in multimedia Internet of things publication-title: Wirel. Pers. Commun. – start-page: 6662 year: 2012 ident: 10.1016/j.cose.2024.103792_br0610 article-title: A game theoretic investigation for high interaction honeypots – start-page: 3 year: 2019 ident: 10.1016/j.cose.2024.103792_br0630 article-title: Using deep learning to generate relational honeydata – start-page: 522 year: 2019 ident: 10.1016/j.cose.2024.103792_br1360 article-title: A game-theoretic framework for dynamic cyber deception in Internet of battlefield things – start-page: 1 year: 2019 ident: 10.1016/j.cose.2024.103792_br0240 article-title: Current state of honeypots and deception strategies in cybersecurity – start-page: 630 year: 2015 ident: 10.1016/j.cose.2024.103792_br0700 article-title: Cloudhoneycy-an integrated honeypot framework for cloud infrastructures – year: 2012 ident: 10.1016/j.cose.2024.103792_br1280 – start-page: 21 year: 2018 ident: 10.1016/j.cose.2024.103792_br0660 article-title: Defending web servers with feints, distraction and obfuscation – volume: 3 start-page: 1025 issue: 6 year: 2016 ident: 10.1016/j.cose.2024.103792_br0840 article-title: Deceptive attack and defense game in honeypot-enabled networks for the Internet of things publication-title: IEEE Int. Things J. doi: 10.1109/JIOT.2016.2547994 – start-page: 261 year: 2015 ident: 10.1016/j.cose.2024.103792_br0880 article-title: Defending against malicious usb firmware with goodusb – volume: 4 start-page: 63 issue: 10 year: 2012 ident: 10.1016/j.cose.2024.103792_br0930 article-title: A survey: recent advances and future trends in honeypot research publication-title: Int. J. Comput. Netw. Inf. Secur. – start-page: 73 year: 2023 ident: 10.1016/j.cose.2024.103792_br1860 article-title: Revealing human attacker behaviors using an adaptive Internet of things honeypot ecosystem – year: 2016 ident: 10.1016/j.cose.2024.103792_br1510 – start-page: 1 year: 2021 ident: 10.1016/j.cose.2024.103792_br1450 article-title: Reinforcement learning-assisted threshold optimization for dynamic honeypot adaptation to enhance iobt networks security – year: 2017 ident: 10.1016/j.cose.2024.103792_br0110 article-title: Honeypot: a deceptive trap publication-title: Int. J. Eng. Technol. Manag. Appl. Sci. – year: 2017 ident: 10.1016/j.cose.2024.103792_br1030 – year: 2020 ident: 10.1016/j.cose.2024.103792_br1180 – start-page: 1 year: 2017 ident: 10.1016/j.cose.2024.103792_br0900 article-title: A novel sdn based stealthy tcp connection handover mechanism for hybrid honeypot systems – start-page: 269 year: 2023 ident: 10.1016/j.cose.2024.103792_br1960 article-title: Sdn-based cyber deception deployment for proactive defense strategy using honey of things and cyber threat intelligence – year: 2019 ident: 10.1016/j.cose.2024.103792_br0640 article-title: Forge: a fake online repository generation engine for cyber deception publication-title: IEEE Trans. Dependable Secure Comput. – start-page: 18 year: 2016 ident: 10.1016/j.cose.2024.103792_br1400 article-title: Deception-based game theoretical approach to mitigate dos attacks – volume: 111 start-page: 14106 issue: 39 year: 2014 ident: 10.1016/j.cose.2024.103792_br1080 article-title: Bioreplicated visual features of nanofabricated buprestid beetle decoys evoke stereotypical male mating flights publication-title: Proc. Natl. Acad. Sci. doi: 10.1073/pnas.1412810111 – start-page: 1 year: 2017 ident: 10.1016/j.cose.2024.103792_br0410 article-title: Iotcandyjar: towards an intelligent-interaction honeypot for iot devices publication-title: Black Hat – year: 2022 ident: 10.1016/j.cose.2024.103792_br0020 – volume: 11 start-page: 38 issue: 1 year: 2017 ident: 10.1016/j.cose.2024.103792_br0400 article-title: Versatile virtual honeynet management framework publication-title: IET Inf. Secur. doi: 10.1049/iet-ifs.2015.0256 – volume: 51 start-page: 2623 year: 2015 ident: 10.1016/j.cose.2024.103792_br1210 article-title: Resilient and trustworthy dynamic data-driven application systems (dddas) services for crisis management environments publication-title: Proc. Comput. Sci. doi: 10.1016/j.procs.2015.05.370 – start-page: 39 year: 2020 ident: 10.1016/j.cose.2024.103792_br0180 article-title: A detailed analysis of intruders' activities in the network through the real-time virtual honeynet experimentation – year: 2021 ident: 10.1016/j.cose.2024.103792_br1500 – volume: 23 start-page: 4060 issue: 8 year: 2023 ident: 10.1016/j.cose.2024.103792_br2090 article-title: Impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure publication-title: Sensors doi: 10.3390/s23084060 – start-page: 123 year: 2017 ident: 10.1016/j.cose.2024.103792_br0690 article-title: The dose makes the poison—leveraging uncertainty for effective malware detection – volume: 141 start-page: 32 year: 2018 ident: 10.1016/j.cose.2024.103792_br1550 article-title: Multi-paradigm deception modeling for cyber defense publication-title: J. Syst. Softw. doi: 10.1016/j.jss.2018.03.031 – start-page: 1602 year: 2019 ident: 10.1016/j.cose.2024.103792_br0890 article-title: Sdn-based hybrid honeypot for attack capture – year: 2013 ident: 10.1016/j.cose.2024.103792_br1070 |
SSID | ssj0017688 |
Score | 2.5200858 |
SecondaryResourceType | review_article |
Snippet | Honeypot technologies are becoming increasingly popular in cybersecurity as they offer valuable insights into adversary behavior with a low rate of false... |
SourceID | crossref elsevier |
SourceType | Enrichment Source Index Database Publisher |
StartPage | 103792 |
SubjectTerms | Cyber deception Cybersecurity Honeynet efficiency Honeypot performance Professional adversaries |
Title | A comprehensive survey on cyber deception techniques to improve honeypot performance |
URI | https://dx.doi.org/10.1016/j.cose.2024.103792 |
Volume | 140 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEF5KvXjxLdZH2YM3id1sdvM4lmKpir3YQm9hn7QiaWhToRd_u7vJJipIDx4TZkj4MpnH8s0MALcYBZIyjj3JlTQFSiS92AR6L2E8CoQQccLt0cDLOBxNydOMzlpgUPfCWFql8_2VTy-9tbvTc2j28sWi91oS6I0BWhakqcutHyYkslZ-_9nQPHyTTsfNfG8j7RpnKo6X5YSbGhGTsvc8wX8Hpx8BZ3gEDlymCPvVyxyDlspOwGG9hQG6n_IUTPrQ8sJXal5x0eF6s_pQW7jMoNhyIymVo67AZmDrGhZLuCjPExScLzO1zZcFzL-bCM7AdPgwGYw8tyvBEwEhhac5ob6gJGQxojoIJEGCqTBEmjPMOaM85hHndryfRomkSPtESYQFYoFSmATnoJ2Zx10AaFI2JiKSSJN3E0VYEvs0TigyX1SHWuMO8GuQUuEGidt9Fu9pzRh7Sy2wqQU2rYDtgLtGJ6_GaOyUpjX26S9jSI2f36F3-U-9K7Bvryoe4zVoF6uNujG5RsG7pTF1wV7_8Xk0_gKwwNSv |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Ja4NAFB5Ccmgv3UvTdQ69FcmoMy7HEBpMs1yaQG4ymySlqCSmkH_fGR1tC6WHXnUeyufzLTPfew-ARwe5glDmWIJJoRIUX1iBcvRWSJnvcs6DkOmtgenMixb4ZUmWLTCoa2E0rdLY_sqml9baXOkZNHv5et17LQn0SgE1C1Ll5coOd3R3KtIGnf5oHM2awwQVUQdNi28lYGpnKpqXpoWrNNHBZfl56Pzun775nOEJODLBIuxX73MKWjI9A8f1IAZo_stzMO9DTQ3fyFVFR4fb3eZD7mGWQr5naqWQhr0Cm56tW1hkcF1uKUi4ylK5z7MC5l91BBdgMXyeDyLLjEuwuItxYSUME5sT7NEAkcR1BUacSs9DCaMOY5SwgPmM6Q5_CQoFQYmNpUAOR9SV0sHuJWin6nFXAKqojXIfh0KF3lhiGgY2CUKC1EdNvCRxusCuQYq56SWuR1q8xzVp7C3WwMYa2LgCtgueGpm86qTx52pSYx__0IdYmfo_5K7_KfcADqL5dBJPRrPxDTjUdypa4y1oF5udvFOhR8HujWp9Ageu12A |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+comprehensive+survey+on+cyber+deception+techniques+to+improve+honeypot+performance&rft.jtitle=Computers+%26+security&rft.au=Javadpour%2C+Amir&rft.au=Ja%27fari%2C+Forough&rft.au=Taleb%2C+Tarik&rft.au=Shojafar%2C+Mohammad&rft.date=2024-05-01&rft.pub=Elsevier+Ltd&rft.issn=0167-4048&rft.eissn=1872-6208&rft.volume=140&rft_id=info:doi/10.1016%2Fj.cose.2024.103792&rft.externalDocID=S0167404824000932 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0167-4048&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0167-4048&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0167-4048&client=summon |