Decoy Processes With Optimal Performance Fingerprints
Decoy targets such as honeypots and decoy I/O are characterized by a higher accuracy in detecting intrusions than anomaly, misuse, and specification-based detectors. Unlike these detectors, decoy targets do not attack an activity classification problem, i.e. they do not attempt to discern between no...
Main Authors: | Sara M. Sutton, Julian L. Rrushi |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2023-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10113641/ |
Similar Items
-
Changing Decisions: The Interaction between Framing and Decoy Effects
by: Adolfo Di Crosta, et al.
Published: (2023-09-01) -
Comparison of false-discovery rates of various decoy databases
by: Sangjeong Lee, et al.
Published: (2021-09-01) -
Contextual effects and psychological features influencing decoy options: A review and research agenda
by: David Gonzalez-Prieto, et al.
Published: (2013-01-01) -
Decoy Technology as a Promising Therapeutic Tool for Atherosclerosis
by: Maryam Mahjoubin-Tehran, et al.
Published: (2021-04-01) -
Target-small decoy search strategy for false discovery rate estimation
by: Hyunwoo Kim, et al.
Published: (2019-08-01)