O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo
{"title":"Cutting Edge Trends in Deception Based Intrusion Detection Systems—A Survey","authors":"O. Oluoha, Terungwa Simon Yange, G. Okereke, F. Bakpo","doi":"10.4236/jis.2021.124014","DOIUrl":null,"url":null,"abstract":"Cyber criminals have become a formidable treat in \ntoday’s world. This present reality has placed cloud computing platforms under \nconstant treats of cyber-attacks at all levels, with an ever-evolving treat \nlandscape. It has been observed that the number of threats faced in cloud \ncomputing is rising exponentially mainly due to its widespread adoption, rapid \nexpansion and a vast attack surface. One of the front-line tools employed in \ndefense against cyber-attacks is the Intrusion Detection Systems (IDSs). In \nrecent times, an increasing number of researchers and cyber security practitioners \nalike have advocated the use of deception-based techniques in IDS and other \ncyber security defenses as against the use of traditional methods. This paper \npresents an extensive overview of the deception technology environment, as well \nas a review of current trends and implementation models in deception-based \nIntrusion Detection Systems. Issues mitigating the implementation of deception \nbased cyber security defenses are also investigated.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"信息安全(英文)","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.4236/jis.2021.124014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
Cyber criminals have become a formidable treat in
today’s world. This present reality has placed cloud computing platforms under
constant treats of cyber-attacks at all levels, with an ever-evolving treat
landscape. It has been observed that the number of threats faced in cloud
computing is rising exponentially mainly due to its widespread adoption, rapid
expansion and a vast attack surface. One of the front-line tools employed in
defense against cyber-attacks is the Intrusion Detection Systems (IDSs). In
recent times, an increasing number of researchers and cyber security practitioners
alike have advocated the use of deception-based techniques in IDS and other
cyber security defenses as against the use of traditional methods. This paper
presents an extensive overview of the deception technology environment, as well
as a review of current trends and implementation models in deception-based
Intrusion Detection Systems. Issues mitigating the implementation of deception
based cyber security defenses are also investigated.