Enhancing reconnaissance security: a 2-tier deception-driven model approach (2TDDSM)
Abstract
The emergence of network security has revolutionized the way educational institutions operate, providing advanced connectivity, enhanced communication, and efficient management of resources. However, with the increasing dependence on interconnected systems, institutions and organizations became vulnerable targets for cyber threats. To address these security challenges, a two-tier deception-driven model specifically designed to for the initial phase of attacks in reconnaissance period where the adversaries is to gather information of the targets. Defending threats in this phase can provide active and proactive defense allowing the administrator to identify potential attackers and understanding their methods, motivation and potential target assets. The model's layered approach creates a resilient defense mechanism that aligns with the advanced deception techniques which aims to misguide potential threats attempting to gather intelligence within the network.
Keywords
Cybersecurity; Deception model; Defense-in-dept; Honeypots; Reconnaissance
Full Text:
PDFDOI: http://doi.org/10.11591/ijeecs.v34.i3.pp1999-2006
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).