This paper describes the concept of implementing deception technology as a line of defense for strengthening organizational security backbone. In any of the defense mechanisms if attackers take a lead will result in failure of the defense mechanism. To keep the information protected from the attacker’s organizations Security Operations Center (SOC) follows rigorous procedures to increase the security of information systems. But the way attackers are getting more and more intelligent finding out loopholes in the exiting Security operations there is a need to increase effort at attacker part and reduce for the defender. Deceptive technologies aim to achieve equilibrium and give Security operations a lead by acting as the first line of defense. These technologies work on the principle “probability of compromise” as an indicator of the amount of work required on the part of an attacker to get an entry to the network. Using traps, lures, and decoys change the approach to detection also create false targets to attract a hacker’s attention. These fakes are then monitored so that anytime a hacker takes the bait, the security team is alerted.

1.
Eugene
Spafford
,
Mohammed H.
Almeshekah
. “
Planning and Integrating Deception into Computer Security Defenses
,
2.
V.
Kaltsa
,
A.
Briassouli
,
I.
Kompatsiaris
,
L. J.
Hadjileontiadis
and
M. G.
Strintzis
,
"Swarm Intelligence for Detecting Interesting Events in Crowded Environments
," in
IEEE Transactions on Image Processing
, vol.
24
, no.
7
, pp.
2153
2166
, July
2015
, .
3.
Fraunholz
Daniel
&
Duque Anton
Simon
&
Lipps
Christoph
&
Reti
Daniel
&
Krohmer
Daniel
&
Pohl
Frederic
&
Tammen
Matthias
&
Schotten
Hans
. (
2018
).
Demystifying Deception Technology:A Survey.
4.
Pete
Blair J.
,
Levine
T.R.
,
Reimer
T.O.
and
McCluskey
J.D.
(
2012
),
"The gap between reality and research: Another look at detecting deception in field settings
",
Policing: An International Journal
, Vol.
35
No.
4
, pp.
723
740
.
5.
Ram Kumar
Singh
and
Prof. T.
Ramanujam
,
"Intrusion Detection System Using Advanced Honeypots
,"
(IJCSIS) International Journal of Computer Science and Information Security
, Vol.
2
, No.
1
,
2009
6.
Muhammad
Adeel
,
Ahsan Ahmad
Chaudhry
,
Ejaz
Ahmed
,
Kashan
Samad
,
Noor Mustafa
Shaikh
,
"HONEYNETS: AN ARCHITECTURAL OVERVIEW
"
7.
Information Assurance Tools Report: Intrusion Detection System
, Sixth Edition September 25,
2009
8.
Oliveira
Jr G. A.
,
Sousa Jr R. T.
de
,
Tenório
,
D. F.
(
2015
).
Desenvolvimento de um Ambiente Honeynet Virtual para Aplicação Governamental
. In:
The Ninth International Conference on Forensic Computer Science.
v.
1
. p.
70
80
(http://www.icofcs.org/2015/papers-published-009.html).
9.
Kesavamoorthy
R.
,
Ruba
Soundar
K.
Swarm intelligence based autonomous DDoS attack detection and defense using multi agent system
.
Cluster Comput
22
,
9469
9476
(
2019
).
This content is only available via PDF.
You do not currently have access to this content.