{"id":"https://openalex.org/W4406461277","doi":"https://doi.org/10.1109/bigdata62323.2024.10825309","title":"DRACO: Production Network Deployment and Evaluation of Deceptive Defense As-a-Service","display_name":"DRACO: Production Network Deployment and Evaluation of Deceptive Defense As-a-Service","publication_year":2024,"publication_date":"2024-12-15","ids":{"openalex":"https://openalex.org/W4406461277","doi":"https://doi.org/10.1109/bigdata62323.2024.10825309"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata62323.2024.10825309","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825309","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115905133","display_name":"Mathieu Couillard","orcid":null},"institutions":[{"id":"https://openalex.org/I35364215","display_name":"Naval Postgraduate School","ror":"https://ror.org/033yfkj90","country_code":"US","type":"education","lineage":["https://openalex.org/I1330347796","https://openalex.org/I3130687028","https://openalex.org/I35364215"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mathieu Couillard","raw_affiliation_strings":["Naval Postgraduate School,Computer Science Department,Monterey,California,USA"],"affiliations":[{"raw_affiliation_string":"Naval Postgraduate School,Computer Science Department,Monterey,California,USA","institution_ids":["https://openalex.org/I35364215"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5015415577","display_name":"Britta Hale","orcid":"https://orcid.org/0000-0003-1131-2109"},"institutions":[{"id":"https://openalex.org/I35364215","display_name":"Naval Postgraduate School","ror":"https://ror.org/033yfkj90","country_code":"US","type":"education","lineage":["https://openalex.org/I1330347796","https://openalex.org/I3130687028","https://openalex.org/I35364215"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Britta Hale","raw_affiliation_strings":["Naval Postgraduate School,Computer Science Department,Monterey,California,USA"],"affiliations":[{"raw_affiliation_string":"Naval Postgraduate School,Computer Science Department,Monterey,California,USA","institution_ids":["https://openalex.org/I35364215"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5115905133"],"corresponding_institution_ids":["https://openalex.org/I35364215"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30055511,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2606","last_page":"2615"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6685010194778442},{"id":"https://openalex.org/keywords/production","display_name":"Production (economics)","score":0.6221078038215637},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.5877672433853149},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5693380236625671},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.46504250168800354},{"id":"https://openalex.org/keywords/astrobiology","display_name":"Astrobiology","score":0.3272877335548401},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.2154974341392517},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.0944828987121582},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.08164680004119873}],"concepts":[{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6685010194778442},{"id":"https://openalex.org/C2778348673","wikidata":"https://www.wikidata.org/wiki/Q739302","display_name":"Production (economics)","level":2,"score":0.6221078038215637},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.5877672433853149},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5693380236625671},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46504250168800354},{"id":"https://openalex.org/C87355193","wikidata":"https://www.wikidata.org/wiki/Q411","display_name":"Astrobiology","level":1,"score":0.3272877335548401},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2154974341392517},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0944828987121582},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.08164680004119873},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata62323.2024.10825309","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata62323.2024.10825309","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE International Conference on Big Data (BigData)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1517527854","https://openalex.org/W2022504616","https://openalex.org/W2031801461","https://openalex.org/W2082135129","https://openalex.org/W2092919138","https://openalex.org/W2103487196","https://openalex.org/W2151584216","https://openalex.org/W2343978497","https://openalex.org/W2360903897","https://openalex.org/W2540831950","https://openalex.org/W2579739707","https://openalex.org/W2622206102","https://openalex.org/W2780533491","https://openalex.org/W2892759841","https://openalex.org/W2913478401","https://openalex.org/W2945492034","https://openalex.org/W2976555458","https://openalex.org/W2981181114","https://openalex.org/W3003960714","https://openalex.org/W3011282767","https://openalex.org/W3018350789","https://openalex.org/W3039975887","https://openalex.org/W3137055208","https://openalex.org/W3151279870","https://openalex.org/W3152342827","https://openalex.org/W3156178383","https://openalex.org/W3195892385","https://openalex.org/W4200016127","https://openalex.org/W4206049107","https://openalex.org/W4206172203","https://openalex.org/W4251742697","https://openalex.org/W4283657717","https://openalex.org/W6630696253","https://openalex.org/W6678872661"],"related_works":["https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2987774938","https://openalex.org/W4256492088","https://openalex.org/W632915154","https://openalex.org/W2055733372","https://openalex.org/W3022067003"],"abstract_inverted_index":{"Cybersecurity":[0],"increasingly":[1],"involves":[2],"not":[3],"only":[4],"passive":[5],"security":[6,51,143],"measures,":[7],"but":[8,40],"also":[9],"an":[10,22],"active":[11,35],"approach":[12],"to":[13,49,88,112,162,180],"network":[14,17,60,120],"defense":[15],"whereby":[16],"managers":[18],"can":[19],"potentially":[20],"gain":[21],"a":[23,83,89,106,118,123,129,153,163],"priori":[24],"view":[25],"of":[26,76,91],"potential":[27,175],"threats.":[28],"Honeypots":[29],"have":[30,68],"long":[31],"offered":[32],"one":[33],"such":[34,97],"measure":[36],"through":[37],"cyber":[38],"deception,":[39],"present":[41],"realistic":[42],"deployment":[43,66,75,177],"challenges":[44],"in":[45,155],"government":[46,124],"contexts":[47],"due":[48],"increased":[50],"risks":[52],"(internal":[53],"honeypots)":[54],"or":[55],"disassociation":[56],"with":[57,150],"the":[58,148],"real":[59],"(external":[61],"honeypots).":[62],"Furthermore,":[63],"while":[64],"various":[65],"methods":[67],"been":[69],"proposed,":[70],"organizational":[71],"management":[72,144],"agreement":[73],"for":[74,122],"honeypots":[77],"on":[78,96,158,174],"real,":[79],"operational":[80],"networks":[81],"is":[82],"common":[84],"research":[85],"obstacle,":[86],"leading":[87],"lack":[90],"insight":[92,173],"about":[93],"actual":[94],"use":[95],"systems.":[98],"In":[99],"this":[100],"work,":[101],"we":[102],"deploy":[103],"and":[104,133,140,171],"analyze":[105],"honeypot":[107,121,135,169,176],"architecture":[108],"concept,":[109,149],"Deceptive":[110],"Resistance":[111],"Adversary":[113],"Cyber":[114],"Operations":[115],"(DRACO)":[116],"\u2013":[117],"live":[119,164],"associated":[125],"network.":[126],"DRACO":[127],"strikes":[128],"balance":[130],"between":[131],"external":[132],"internal":[134],"placement,":[136],"successfully":[137],"mitigating":[138],"risk":[139,179],"enabling":[141],"system":[142],"approval.":[145],"We":[146],"validate":[147],"analysis":[151],"showing":[152],"difference":[154],"adversarial":[156],"activity":[157],"DRACO,":[159],"as":[160],"connected":[161],"government-operated":[165],"network,":[166],"versus":[167],"control":[168],"deployments":[170],"provides":[172],"without":[178],"production":[181],"networks.":[182]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
