Deceptive Cybersecurity Defense: Neuro-Adaptive Honeypots Using Deep Neural Networks
Keywords:
Neuro-Adaptive Honeypots, Cybersecurity, Deep Neural Networks, Machine Learning, Deceptive DefenseAbstract
In the dynamic environment of current threats, the need for intelligent defense measures is more important than ever. Such an approach, called honeypots, blindly guides them by providing fake but highly valuable targets. But traditional honeypots remain passive and originated for slow-growing and obsolete threats, not for modern dynamic threats. This work introduces the incorporation of deep neural networks (DNNs) into honeypots, which gives rise to neuro-adaptive honeypots. These intelligent systems fully utilize machine learning in order to adapt autonomously and are therefore becoming more and more efficient at eluding attackers and trapping them as well. These honeypots are actually neuro-adaptive in that they gain experience from the activities of the attackers in real-time and are thus likely to deceive and, therefore, detect the attackers. This paper aims to analyze neuro-adaptive honeypots, particularly the use of DNNs at the core of the system design and operation. Furthermore, we outline the advantages, risks, and future applications of the presented approach to enhance cybersecurity defense mechanisms against rather more powerful and concealed cyber threats.
References
- Almeshekah, M. H., & Spafford, E. H. (2016). Cyber security deception. Cyber Deception: Building the Scientific Foundation, 23-50. https://www.academia.edu/download/50147427/Almeshekah-cyber-security-deception-book-chapter.pdf
- Baskerville, R., & Wang, P. A THEORY OF DECEPTIVE CYBERSECURITY.
- Calder, S. R. (2016). A Case for Deception in the Defense. Military Cyber Affairs, 2(1), 4.
- De Faveri, C., Moreira, A., & Amaral, V. (2018). Multi-paradigm deception modeling for cyber defense. Journal of Systems and Software, 141, 32-51.
- Ferguson-Walter, K., Fugate, S., Mauger, J., & Major, M. (2019, April). Game theory for adaptive defensive cyber deception. In Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security (pp. 1-8). https://dl.acm.org/doi/pdf/10.1145/3314058.3314063
- Vasa, Y. (2021). Develop Explainable AI (XAI) Solutions For Data Engineers. NVEO - Natural Volatiles & Essential Oils, 8(3), 425–432. https://doi.org/https://doi.org/10.53555/nveo.v8i3.5769
- Singirikonda, P., Katikireddi, P. M., & Jaini, S. (2021). Cybersecurity In Devops: Integrating Data Privacy And Ai-Powered Threat Detection For Continuous Delivery. NVEO - Natural Volatiles & Essential Oils, 8(2), 215–216. https://doi.org/https://doi.org/10.53555/nveo.v8i2.5770
- Kilaru, N. B., & Cheemakurthi, S. K. M. (2021). Techniques For Feature Engineering To Improve Ml Model Accuracy. NVEO-NATURAL VOLATILES & ESSENTIAL OILS Journal| NVEO, 194-200.
- Vasa, Y., Jaini, S., & Singirikonda, P. (2021). Design Scalable Data Pipelines For Ai Applications. NVEO - Natural Volatiles & Essential Oils, 8(1), 215–221. https://doi.org/https://doi.org/10.53555/nveo.v8i1.5772
- Sukender Reddy Mallreddy(2020).Cloud Data Security: Identifying Challenges and Implementing Solutions.JournalforEducators,TeachersandTrainers,Vol.11(1).96 -102.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.