Deceptive Cybersecurity Defense: Neuro-Adaptive Honeypots Using Deep Neural Networks

Authors

  • Prasanthi Vallurupalli  Independent Researcher, USA

Keywords:

Neuro-Adaptive Honeypots, Cybersecurity, Deep Neural Networks, Machine Learning, Deceptive Defense

Abstract

In the dynamic environment of current threats, the need for intelligent defense measures is more important than ever. Such an approach, called honeypots, blindly guides them by providing fake but highly valuable targets. But traditional honeypots remain passive and originated for slow-growing and obsolete threats, not for modern dynamic threats. This work introduces the incorporation of deep neural networks (DNNs) into honeypots, which gives rise to neuro-adaptive honeypots. These intelligent systems fully utilize machine learning in order to adapt autonomously and are therefore becoming more and more efficient at eluding attackers and trapping them as well. These honeypots are actually neuro-adaptive in that they gain experience from the activities of the attackers in real-time and are thus likely to deceive and, therefore, detect the attackers. This paper aims to analyze neuro-adaptive honeypots, particularly the use of DNNs at the core of the system design and operation. Furthermore, we outline the advantages, risks, and future applications of the presented approach to enhance cybersecurity defense mechanisms against rather more powerful and concealed cyber threats.

References

  1. Almeshekah, M. H., & Spafford, E. H. (2016). Cyber security deception. Cyber Deception: Building the Scientific Foundation, 23-50. https://www.academia.edu/download/50147427/Almeshekah-cyber-security-deception-book-chapter.pdf
  2. Baskerville, R., & Wang, P. A THEORY OF DECEPTIVE CYBERSECURITY.
  3. Calder, S. R. (2016). A Case for Deception in the Defense. Military Cyber Affairs, 2(1), 4.
  4. De Faveri, C., Moreira, A., & Amaral, V. (2018). Multi-paradigm deception modeling for cyber defense. Journal of Systems and Software, 141, 32-51.
  5. Ferguson-Walter, K., Fugate, S., Mauger, J., & Major, M. (2019, April). Game theory for adaptive defensive cyber deception. In Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security (pp. 1-8). https://dl.acm.org/doi/pdf/10.1145/3314058.3314063
  6. Vasa, Y. (2021). Develop Explainable AI (XAI) Solutions For Data Engineers. NVEO - Natural Volatiles & Essential Oils, 8(3), 425–432. https://doi.org/https://doi.org/10.53555/nveo.v8i3.5769
  7. Singirikonda, P., Katikireddi, P. M., & Jaini, S. (2021). Cybersecurity In Devops: Integrating Data Privacy And Ai-Powered Threat Detection For Continuous Delivery. NVEO - Natural Volatiles & Essential Oils, 8(2), 215–216. https://doi.org/https://doi.org/10.53555/nveo.v8i2.5770
  8. Kilaru, N. B., & Cheemakurthi, S. K. M. (2021). Techniques For Feature Engineering To Improve Ml Model Accuracy. NVEO-NATURAL VOLATILES & ESSENTIAL OILS Journal| NVEO, 194-200.
  9. Vasa, Y., Jaini, S., & Singirikonda, P. (2021). Design Scalable Data Pipelines For Ai Applications. NVEO - Natural Volatiles & Essential Oils, 8(1), 215–221. https://doi.org/https://doi.org/10.53555/nveo.v8i1.5772
  10. Sukender Reddy Mallreddy(2020).Cloud Data Security: Identifying Challenges and Implementing Solutions.JournalforEducators,TeachersandTrainers,Vol.11(1).96 -102.

Downloads

Published

2021-04-22

Issue

Section

Research Articles

How to Cite

[1]
Prasanthi Vallurupalli "Deceptive Cybersecurity Defense: Neuro-Adaptive Honeypots Using Deep Neural Networks" International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 8, Issue 2, pp.496-501, November-December-2021.