Deception techniques in computer security: A research perspective