Loading [MathJax]/extensions/MathMenu.js
Deception: Technologies and Strategy for Cybersecurity | IEEE Conference Publication | IEEE Xplore

Deception: Technologies and Strategy for Cybersecurity


Abstract:

There are many different types of security threats to individual, business and government enterprises. Although there are efforts to ensure that technologies work to the ...Show More

Abstract:

There are many different types of security threats to individual, business and government enterprises. Although there are efforts to ensure that technologies work to the best levels, there are still several challenges. Keeping the security of the enterprise system in view, security designers have introduced multiple security perimeters like firewalls and threat detection and response (TDR) systems. These frameworks directly contribute to detecting and defending any unwanted action into the system. The objective of this paper is to survey the role and strategies of deception in cyberattack. A detailed discussion of technologies and tools for combating unwanted adversary actions are presented.
Date of Conference: 10-12 December 2019
Date Added to IEEE Xplore: 14 May 2020
ISBN Information:
Conference Location: Tokyo, Japan

Contact IEEE to Subscribe

References

References is not available for this document.