{"id":"https://openalex.org/W2906747544","doi":"https://doi.org/10.1109/isi.2018.8587326","title":"Measuring the Effectiveness of Network Deception","display_name":"Measuring the Effectiveness of Network Deception","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2906747544","doi":"https://doi.org/10.1109/isi.2018.8587326","mag":"2906747544"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2018.8587326","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2018.8587326","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5008074294","display_name":"Shridatt Sugrim","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Shridatt Sugrim","raw_affiliation_strings":["Cyber and Wireless Analytics Department, Perspecta Labs, Basking Ridge, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Cyber and Wireless Analytics Department, Perspecta Labs, Basking Ridge, NJ, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109412228","display_name":"Sridhar Venkatesan","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sridhar Venkatesan","raw_affiliation_strings":["Cyber and Wireless Analytics Department, Perspecta Labs, Basking Ridge, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Cyber and Wireless Analytics Department, Perspecta Labs, Basking Ridge, NJ, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009417233","display_name":"Jason A. Youzwak","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jason A. Youzwak","raw_affiliation_strings":["Cyber and Wireless Analytics Department, Perspecta Labs, Basking Ridge, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Cyber and Wireless Analytics Department, Perspecta Labs, Basking Ridge, NJ, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110132499","display_name":"Cho\u2010Yu Jason Chiang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cho-Yu J. Chiang","raw_affiliation_strings":["Cyber and Wireless Analytics Department, Perspecta Labs, Basking Ridge, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Cyber and Wireless Analytics Department, Perspecta Labs, Basking Ridge, NJ, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103911831","display_name":"Ritu Chadha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ritu Chadha","raw_affiliation_strings":["Cyber and Wireless Analytics Department, Perspecta Labs, Basking Ridge, NJ, USA"],"affiliations":[{"raw_affiliation_string":"Cyber and Wireless Analytics Department, Perspecta Labs, Basking Ridge, NJ, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066709657","display_name":"Massimiliano Albanese","orcid":"https://orcid.org/0000-0002-2675-5810"},"institutions":[{"id":"https://openalex.org/I162714631","display_name":"George Mason University","ror":"https://ror.org/02jqj7156","country_code":"US","type":"education","lineage":["https://openalex.org/I162714631"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Massimiliano Albanese","raw_affiliation_strings":["Center for Secure Information Systems, George Mason University, Fairfax, VA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Secure Information Systems, George Mason University, Fairfax, VA, USA","institution_ids":["https://openalex.org/I162714631"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5002845585","display_name":"Hasan \u00c7am","orcid":"https://orcid.org/0000-0002-3531-7003"},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hasan Cam","raw_affiliation_strings":["Army Research Laboratory, Aldephi, MD, USA"],"affiliations":[{"raw_affiliation_string":"Army Research Laboratory, Aldephi, MD, USA","institution_ids":["https://openalex.org/I166416128"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5008074294"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.5536,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.71793589,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"142","last_page":"147"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.9462440013885498},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7376314401626587},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.6293596029281616},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5550398230552673},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5377593040466309},{"id":"https://openalex.org/keywords/bayesian-network","display_name":"Bayesian network","score":0.4975314438343048},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47009941935539246},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4060514271259308},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.34751269221305847}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.9462440013885498},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7376314401626587},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.6293596029281616},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5550398230552673},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5377593040466309},{"id":"https://openalex.org/C33724603","wikidata":"https://www.wikidata.org/wiki/Q812540","display_name":"Bayesian network","level":2,"score":0.4975314438343048},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47009941935539246},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4060514271259308},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.34751269221305847},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2018.8587326","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2018.8587326","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1926641597","https://openalex.org/W2051968851","https://openalex.org/W2134798469","https://openalex.org/W2149235666","https://openalex.org/W2561815404","https://openalex.org/W2620649268","https://openalex.org/W6663414642","https://openalex.org/W6730681569"],"related_works":["https://openalex.org/W2033600672","https://openalex.org/W2362932354","https://openalex.org/W2120942677","https://openalex.org/W3197812723","https://openalex.org/W196783966","https://openalex.org/W4313343363","https://openalex.org/W769785222","https://openalex.org/W1580024806","https://openalex.org/W1557910770","https://openalex.org/W2963058055"],"abstract_inverted_index":{"Cyber":[0],"reconnaissance":[1,32,89],"is":[2,77,130],"the":[3,13,44,69,88,96,116,119,139,151,158,161,179,187],"process":[4,97],"of":[5,15,46,71,91,98,118,153,178],"gathering":[6,99],"information":[7,100],"about":[8],"a":[9,26,84,92,106,126,134,168],"target":[10],"network":[11,60,93,154],"for":[12,186],"purpose":[14],"compromising":[16],"systems":[17],"within":[18],"that":[19,51,110,129],"network.":[20],"Network-based":[21],"deception":[22,57,75,174],"has":[23,37],"emerged":[24],"as":[25,103],"promising":[27],"approach":[28],"to":[29,62,86,149],"disrupt":[30],"attackers'":[31,120],"efforts.":[33],"However,":[34],"limited":[35],"work":[36],"been":[38],"done":[39],"so":[40],"far":[41],"on":[42,147],"measuring":[43],"effectiveness":[45,70,152],"network-based":[47],"deception.":[48,113,155],"Furthermore,":[49],"given":[50],"Software-Defined":[52],"Networking":[53],"(SDN)":[54],"facilitates":[55],"cyber":[56,74,107],"by":[58,101,132,164],"allowing":[59],"traffic":[61],"be":[63],"modified":[64],"and":[65,94,160,189],"injected":[66],"on-the-fly,":[67],"understanding":[68],"employing":[72],"different":[73],"strategies":[76],"critical.":[78],"In":[79],"this":[80],"paper,":[81],"we":[82,124,142],"present":[83,143],"model":[85,95,159,188],"study":[87],"surface":[90],"attackers":[102],"interactions":[104],"with":[105,167],"defensive":[108],"system":[109,128],"may":[111],"use":[112],"To":[114],"capture":[115],"evolution":[117],"knowledge":[121],"during":[122],"reconnaissance,":[123],"design":[125],"belief":[127],"updated":[131],"using":[133],"Bayesian":[135],"inference":[136],"method.":[137],"For":[138],"proposed":[140,190],"model,":[141],"two":[144,162],"metrics":[145,163],"based":[146],"KL-divergence":[148],"quantify":[150],"We":[156],"tested":[157],"conducting":[165],"experiments":[166,180],"simulated":[169],"attacker":[170],"in":[171],"an":[172],"SDN-based":[173],"system.":[175],"The":[176],"results":[177],"match":[181],"our":[182],"expectations,":[183],"providing":[184],"support":[185],"metrics.":[191]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
