Deployment methodology of deception technology for effective defense
This paper describes the concept of implementing deception technology as a line of defense for strengthening organizational security backbone. In any of the defense mechanisms if attackers take a lead will result in failure of the defense mechanism. To keep the information protected from the attacke...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | This paper describes the concept of implementing deception technology as a line of defense for strengthening organizational security backbone. In any of the defense mechanisms if attackers take a lead will result in failure of the defense mechanism. To keep the information protected from the attacker’s organizations Security Operations Center (SOC) follows rigorous procedures to increase the security of information systems. But the way attackers are getting more and more intelligent finding out loopholes in the exiting Security operations there is a need to increase effort at attacker part and reduce for the defender. Deceptive technologies aim to achieve equilibrium and give Security operations a lead by acting as the first line of defense. These technologies work on the principle “probability of compromise” as an indicator of the amount of work required on the part of an attacker to get an entry to the network. Using traps, lures, and decoys change the approach to detection also create false targets to attract a hacker’s attention. These fakes are then monitored so that anytime a hacker takes the bait, the security team is alerted. |
---|---|
ISSN: | 0094-243X 1551-7616 |
DOI: | 10.1063/5.0154436 |