Enhancing reconnaissance security: a 2-tier deception-driven model approach (2TDDSM)

Anazel P. Gamilla, Thelma D. Palaoag, Marlon A. Naagas

Abstract


The emergence of network security has revolutionized the way educational institutions operate, providing advanced connectivity, enhanced communication, and efficient management of resources. However, with the increasing dependence on interconnected systems, institutions and organizations became vulnerable targets for cyber threats. To address these security challenges, a two-tier deception-driven model specifically designed to for the initial phase of attacks in reconnaissance period where the adversaries is to gather information of the targets. Defending threats in this phase can provide active and proactive defense allowing the administrator to identify potential attackers and understanding their methods, motivation and potential target assets. The model's layered approach creates a resilient defense mechanism that aligns with the advanced deception techniques which aims to misguide potential threats attempting to gather intelligence within the network.

Keywords


Cybersecurity; Deception model; Defense-in-dept; Honeypots; Reconnaissance

Full Text:

PDF


DOI: http://doi.org/10.11591/ijeecs.v34.i3.pp1999-2006

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).

shopify stats IJEECS visitor statistics