Deployment methodology of deception technology for effective defense

This paper describes the concept of implementing deception technology as a line of defense for strengthening organizational security backbone. In any of the defense mechanisms if attackers take a lead will result in failure of the defense mechanism. To keep the information protected from the attacke...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Pateria, Jalaj, Ahuja, Laxmi, Som, Subhranil
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This paper describes the concept of implementing deception technology as a line of defense for strengthening organizational security backbone. In any of the defense mechanisms if attackers take a lead will result in failure of the defense mechanism. To keep the information protected from the attacker’s organizations Security Operations Center (SOC) follows rigorous procedures to increase the security of information systems. But the way attackers are getting more and more intelligent finding out loopholes in the exiting Security operations there is a need to increase effort at attacker part and reduce for the defender. Deceptive technologies aim to achieve equilibrium and give Security operations a lead by acting as the first line of defense. These technologies work on the principle “probability of compromise” as an indicator of the amount of work required on the part of an attacker to get an entry to the network. Using traps, lures, and decoys change the approach to detection also create false targets to attract a hacker’s attention. These fakes are then monitored so that anytime a hacker takes the bait, the security team is alerted.
ISSN:0094-243X
1551-7616
DOI:10.1063/5.0154436