Journal on Communications ›› 2017, Vol. 38 ›› Issue (12): 128-143.doi: 10.11959/j.issn.1000-436x.2017281

• Comprehensive Review • Previous Articles     Next Articles

Survey on cyber deception

Zhao-peng JIA1,2,Bin-xing FANG1,3,4,Chao-ge LIU2,5,Qi-xu LIU2,5,Jian-bao LIN1,2   

  1. 1 School of Cyberspace Security,Beijing University of Posts and Telecommunications,Beijing 100876,China
    2 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    3 Cyberspace Institute of Advanced Technology,Guangdong University,Guangzhou 510006,China
    4 Institute of Electronic and Information Engineering of UESTC in Guangdong,Dongguan 523808,China
    5 School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China
  • Revised:2017-08-16 Online:2017-12-01 Published:2018-01-19
  • Supported by:
    The National Key Research and Development Program of China(2016YFB0801604);Dongguan Innovative Research Team Program(201636000100038);Key Laboratory of Network Assessment Technology at Chinese Academy of Sciences and Beijing Key Laboratory of Network Security and Protection Technology

Abstract:

The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.

Key words: cyber deception, cognitive process, attack, defense

CLC Number: 

No Suggested Reading articles found!