Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey

O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo
{"title":"Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey","authors":"O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo","doi":"10.4236/jis.2021.124014","DOIUrl":null,"url":null,"abstract":"Cyber criminals have become a formidable treat in \ntoday’s world. This present reality has placed cloud computing platforms under \nconstant treats of cyber-attacks at all levels, with an ever-evolving treat \nlandscape. It has been observed that the number of threats faced in cloud \ncomputing is rising exponentially mainly due to its widespread adoption, rapid \nexpansion and a vast attack surface. One of the front-line tools employed in \ndefense against cyber-attacks is the Intrusion Detection Systems (IDSs). In \nrecent times, an increasing number of researchers and cyber security practitioners \nalike have advocated the use of deception-based techniques in IDS and other \ncyber security defenses as against the use of traditional methods. This paper \npresents an extensive overview of the deception technology environment, as well \nas a review of current trends and implementation models in deception-based \nIntrusion Detection Systems. Issues mitigating the implementation of deception \nbased cyber security defenses are also investigated.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"信息安全(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.4236/jis.2021.124014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Cyber criminals have become a formidable treat in today’s world. This present reality has placed cloud computing platforms under constant treats of cyber-attacks at all levels, with an ever-evolving treat landscape. It has been observed that the number of threats faced in cloud computing is rising exponentially mainly due to its widespread adoption, rapid expansion and a vast attack surface. One of the front-line tools employed in defense against cyber-attacks is the Intrusion Detection Systems (IDSs). In recent times, an increasing number of researchers and cyber security practitioners alike have advocated the use of deception-based techniques in IDS and other cyber security defenses as against the use of traditional methods. This paper presents an extensive overview of the deception technology environment, as well as a review of current trends and implementation models in deception-based Intrusion Detection Systems. Issues mitigating the implementation of deception based cyber security defenses are also investigated.
基于欺骗的入侵检测系统的前沿趋势综述
网络犯罪已经成为当今世界的一大威胁。当前的现实使云计算平台不断受到各级网络攻击的攻击,并且受到不断发展的攻击。据观察,云计算面临的威胁数量呈指数级增长,主要是由于云计算的广泛采用、快速扩展和巨大的攻击面。入侵检测系统(ids)是防御网络攻击的一线工具之一。近年来,越来越多的研究人员和网络安全从业者都主张在入侵检测和其他网络安全防御中使用基于欺骗的技术,而不是使用传统方法。本文对欺骗技术环境进行了广泛的概述,并对基于欺骗的入侵检测系统的当前趋势和实现模型进行了回顾。还研究了减轻基于欺骗的网络安全防御实施的问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
211
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信