{"title":"Evaluation of Cyber Deception Using Deep Learning Algorithms","authors":"Binayak Parashar","doi":"10.2139/ssrn.3732881","DOIUrl":null,"url":null,"abstract":"A machine learning-based approach is proposed and actualized to measure cyber deceptive defenses with negligible human inclusion. This dodges obstructions related to deceptive examination on humans, amplifying robotized assessment's adequacy before human subject’s research must be attempted. Utilizing ongoing advances in profound learning, the methodology synthesizes realistic, interactive, and adaptive traffic for utilization by target web services. A contextual analysis applies how to assess an interruption identification framework furnished with application layer embedded deceptive reactions to attacks. Results exhibit that blending adaptive web traffic bound with hesitant attacks controlled by outfit learning, online adaptive metric learning, and novel class discovery to recreate able enemies comprises a forceful and challenging test of cyber deceptive defenses.","PeriodicalId":414708,"journal":{"name":"Urban Transportation eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Urban Transportation eJournal","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2139/ssrn.3732881","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
A machine learning-based approach is proposed and actualized to measure cyber deceptive defenses with negligible human inclusion. This dodges obstructions related to deceptive examination on humans, amplifying robotized assessment's adequacy before human subject’s research must be attempted. Utilizing ongoing advances in profound learning, the methodology synthesizes realistic, interactive, and adaptive traffic for utilization by target web services. A contextual analysis applies how to assess an interruption identification framework furnished with application layer embedded deceptive reactions to attacks. Results exhibit that blending adaptive web traffic bound with hesitant attacks controlled by outfit learning, online adaptive metric learning, and novel class discovery to recreate able enemies comprises a forceful and challenging test of cyber deceptive defenses.