Network Deception Technologies and The Possible Integration with Artificial Intelligence

  • Simon Rafael Gaston
  • University of Asia and the Pacific
Published in

  • Computer networks have employed a variety of techniques to secure themselves from attackers. A technique that is used is deception technologies, these are systems put in place to mislead a malicious actor and prevent them from accessing the important parts of a network. Such deception technologies include honeypots and moving target defense. Researchers are looking at improving deception technology by integrating artificial intelligence and machine learning in to facilitate the process. This paper intends to look into the various forms of such deception technologies, how networks can benefit from certain improvements in their implementation, and possible integration with AI.

  • Network security
  • honeypot
  • Moving Target Defense
  • Artificial Intelligence
  • Machine Learning
  • Generative Pre-Trained

Download Papers

  • N. Meghanathan, S. Reddy Allam, and L. A. Moore, “Tools and Techniques for Network Forensics.”
  • L. Elluri, V. Mandalapu, P. Vyas, and N. Roy, “Advances in Cybercrime Prediction: A Survey of Machine, Deep, Transfer, and Adaptive Learning Techniques,” Apr. 2023., in press.
  • A. Rashid and J. Such, “Effectiveness of Moving Target Defenses for Adversarial Attacks in ML-based Malware Detection,” Feb. 2023. , in press.
  • F. Setianto, E. Tsani, F. Sadiq, G. Domalis, D. Tsakalidis, and P. Kostakos, “GPT-2C,” Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2021., in press.
  • A. Desai, “Machine Learning for Economics Research: When what and how?,” SSRN Electronic Journal, Apr. 2023., in press.
  • A. H. Celdran, P. M. Sanchez Sanchez, J. von der Assen, T. Schenk, G. Bovet, G. M. Perez, and B. Stiller, “RL and Fingerprinting to Select Moving Target Defense Mechanisms for Zero-day Attacks in IoT,” Dec. 2022., in press.
  • F. McKee and D. Noever, “Chatbots in a Honeypot World,” Jan. 2023., in press.
  • V. S. Mfogo, A. Zemkoho, L. Njilla, M. Nkenlifack, and C. Kamhoua, “AIIPot: Adaptive Intelligent-Interaction Honeypot for IoT Devices,” Mar. 2023., in press.
  • M. Nawrocki, J. Kristoff, R. Hiesgen, C. Kanich, T. C. Schmidt, and M. Wahlisch, “SoK: A Data-driven View on Methods to Detect Reflective Amplification DDoS Attacks Using Honeypots,” Feb. 2023., in press.
  • J. von der Assen, A. Huertas Celdran, P. M. Sanchez Sanchez, J. Cedeno, G. Bovet, G. Martinez Perez, and B. Stiller, “A Lightweight Moving Target Defense Framework for Multi-purpose Malware Affecting IoT Devices,” Oct. 2022., in press.
  • D. Reti, D. Fraunholz, K. Elzer, D. Schneider, and H. D. Schotten, “Evaluating deception and moving target defense with network attack simulation,” Proceedings of the 9th ACM Workshop on Moving Target Defense, 2022.
  • D. Ergenc, F. Schneider, P. Kling, and M. Fischer, “Moving Target Defense for Service-oriented Mission-critical Networks,” Mar. 2023., in press.
  • G. Pagnotta, F. de Gaspari, D. Hitaj, M. Andreolini, M. Colajanni, and L. V. Mancini, “DOLOS: A Novel Architecture for Moving Target Defense,” Mar. 2023., in press
  • L. Huang and Q. Zhu, “Adaptive honeypot engagement through reinforcement learning of semi-markov decision processes,” Lecture Notes in Computer Science, pp. 196–216, 2019.
  • B. Cates, A. Kulkarni, and S. Sreedharan, “Planning for Attacker Entrapment in Adversarial Settings,” Apr. 2023.
  • J. Franco, A. Aris, B. Canberk, and A. S. Uluagac, “A survey of honeypots and honeynets for internet of things, industrial internet of things, and cyber-physical systems,” IEEE Communications Surveys & Tutorials, vol. 23, no. 4, pp. 2351–2383, 2021.