Deception techniques have been widely seen as a game changer in cyber defense. In this paper, we review representative techniques in honeypots, honeytokens, and moving target defense, spanning from the late 1980s to the year 2021. Techniques from these three domains complement with each other and may be leveraged to build a holistic deception based defense. However, to the best of our knowledge, there has not been a work that provides a systematic retrospect of these three domains all together and investigates their integrated usage for orchestrated deceptions. Our paper aims to fill this gap. By utilizing a tailored cyber kill chain model which can reflect the current threat landscape and a four-layer deception stack, a two-dimensional taxonomy is developed, based on which the deception techniques are classified. The taxonomy literally answers which phases of a cyber attack campaign the techniques can disrupt and which layers of the deception stack they belong to. Cyber defenders may use the taxonomy as a reference to design an organized and comprehensive deception plan, or to prioritize deception efforts for a budget conscious solution. We also discuss two important points for achieving active and resilient cyber defense, namely deception in depth and deception lifecycle, where several notable proposals are illustrated. Finally, some outlooks on future research directions are presented, including dynamic integration of different deception techniques, quantified deception effects and deception operation cost, hardware-supported deception techniques, as well as techniques developed based on better understanding of the human element.
翻译:欺骗技术被广泛视为网络防御的游戏变换者。 在本文中,我们审视了1980年代后期至2021年的蜂蜜罐、蜂窝和移动目标防御中的代表技术。这三个领域的技术互为补充,可以用来建立基于全面欺骗的防御。然而,据我们所知,还没有一项工作系统地回顾这三个领域,共同调查它们合谋欺骗的综合用途。我们的文件旨在填补这一空白。我们通过使用一个定制的、能够反映当前威胁景观和四层欺骗堆的网络杀人链模型,开发了一种二维的分类学,在此基础上对欺骗技术进行分类。从算术可以干扰的网络攻击运动的各个阶段和它们所属的欺骗堆。网络捍卫者可能利用分类学作为参考来设计一个有组织的全面欺骗计划,或者将欺骗努力作为预算意识解决方案的优先。我们还讨论了实现积极和有弹性的网络防御的两个重要点,即深度和四层欺骗游戏堆,这是基于欺骗技术的双重的欺骗技术,最后,这是基于具有可辨测深的欺骗力的欺骗性生命循环操作方法,其中的欺骗技术,是具有可量化的、具有说服力的硬性的生命循环。 最后,网络化的计算方法是各种整合。