Ecole d'ingénieur et centre de recherche en Sciences du numérique

Deception techniques in computer security: A research perspective

Han, Xiao; Kheir, Nizar; Balzarotti, Davide

ACM Computing Surveys (CSUR), VOL.51, N°4, July 2018

A recent trend both in academia and industry is to explore the use of deception techniques to achieve proactive attack detection and defense--to the point of marketing intrusion deception solutions as zero-false-positive intrusion detection. However, there is still a general lack of understanding of deception techniques from a research perspective, and it is not clear how the effectiveness of these solutions can be measured and compared with other security approaches. To shed light on this topic, we introduce a comprehensive classification of existing solutions and survey the current application of deception techniques in computer security. Furthermore, we discuss the limitations of existing solutions, and we analyze several open research directions, including the design of strategies to help defenders to design and integrate deception within a target architecture, the study of automated ways to deploy deception in complex systems, the update and re-deployment of deception, and, most importantly, the design of new techniques and experiments to evaluate the effectiveness of the existing deception techniques.

Document Doi Bibtex

Titre:Deception techniques in computer security: A research perspective
Mots Clés:Intrusion detection systems; Systems security; Network security; Software and application security
Type:Journal
Langue:English
Ville:
Date:
Département:Sécurité numérique
Eurecom ref:5531
Copyright: © ACM, 2018. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in ACM Computing Surveys (CSUR), VOL.51, N°4, July 2018 http://dx.doi.org/10.1145/3214305
Bibtex: @article{EURECOM+5531, doi = {http://dx.doi.org/10.1145/3214305}, year = {2018}, month = {04}, title = {{D}eception techniques in computer security: {A} research perspective}, author = {{H}an, {X}iao and {K}heir, {N}izar and {B}alzarotti, {D}avide}, journal = {{ACM} {C}omputing {S}urveys ({CSUR}), {VOL}.51, {N}°4, {J}uly 2018 }, url = {http://www.eurecom.fr/publication/5531} }
Voir aussi: