This paper describes the concept of implementing deception technology as a line of defense for strengthening organizational security backbone. In any of the defense mechanisms if attackers take a lead will result in failure of the defense mechanism. To keep the information protected from the attacker’s organizations Security Operations Center (SOC) follows rigorous procedures to increase the security of information systems. But the way attackers are getting more and more intelligent finding out loopholes in the exiting Security operations there is a need to increase effort at attacker part and reduce for the defender. Deceptive technologies aim to achieve equilibrium and give Security operations a lead by acting as the first line of defense. These technologies work on the principle “probability of compromise” as an indicator of the amount of work required on the part of an attacker to get an entry to the network. Using traps, lures, and decoys change the approach to detection also create false targets to attract a hacker’s attention. These fakes are then monitored so that anytime a hacker takes the bait, the security team is alerted.
Skip Nav Destination
Article navigation
15 June 2023
RECENT ADVANCES IN SCIENCES, ENGINEERING, INFORMATION TECHNOLOGY & MANAGEMENT
6–7 May 2022
Jaipur, India
Research Article|
June 15 2023
Deployment methodology of deception technology for effective defense
Jalaj Pateria;
Jalaj Pateria
a
Amity Institute of Information Technology, Amity University
, Noida, Uttar Pradesh, India
aCorresponding author: jalaj.pateria@s.amity.edu
Search for other works by this author on:
Laxmi Ahuja;
Laxmi Ahuja
b
Amity Institute of Information Technology, Amity University
, Noida, Uttar Pradesh, India
Search for other works by this author on:
Subhranil Som
Subhranil Som
c
Amity Institute of Information Technology, Amity University
, Noida, Uttar Pradesh, India
Search for other works by this author on:
AIP Conf. Proc. 2782, 020013 (2023)
Citation
Jalaj Pateria, Laxmi Ahuja, Subhranil Som; Deployment methodology of deception technology for effective defense. AIP Conf. Proc. 15 June 2023; 2782 (1): 020013. https://doi.org/10.1063/5.0154436
Download citation file:
Pay-Per-View Access
$40.00
Sign In
You could not be signed in. Please check your credentials and make sure you have an active account and try again.
15
Views
Citing articles via
Design of a 100 MW solar power plant on wetland in Bangladesh
Apu Kowsar, Sumon Chandra Debnath, et al.
Social mediated crisis communication model: A solution for social media crisis?
S. N. A. Hamid, N. Ahmad, et al.
The effect of a balanced diet on improving the quality of life in malignant neoplasms
Yu. N. Melikova, A. S. Kuryndina, et al.