{"id":"https://openalex.org/W7133207287","doi":"https://doi.org/10.1109/ojcs.2026.3669021","title":"Toward Realistic and Efficient Cyber Deception","display_name":"Toward Realistic and Efficient Cyber Deception","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7133207287","doi":"https://doi.org/10.1109/ojcs.2026.3669021"},"language":"en","primary_location":{"id":"doi:10.1109/ojcs.2026.3669021","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcs.2026.3669021","pdf_url":null,"source":{"id":"https://openalex.org/S4210176459","display_name":"IEEE Open Journal of the Computer Society","issn_l":"2644-1268","issn":["2644-1268"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Computer Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/ojcs.2026.3669021","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5127783547","display_name":"Hind Alrubaish","orcid":null},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Hind Alrubaish","raw_affiliation_strings":["King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015916901","display_name":"Walid Aljoby","orcid":"https://orcid.org/0000-0002-0976-9962"},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Walid Aljoby","raw_affiliation_strings":["King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127856689","display_name":"Ahmed Aldeek","orcid":null},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ahmed Aldeek","raw_affiliation_strings":["King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5127820856","display_name":"Mohammed Alkubaish","orcid":null},"institutions":[{"id":"https://openalex.org/I134085113","display_name":"King Fahd University of Petroleum and Minerals","ror":"https://ror.org/03yez3163","country_code":"SA","type":"education","lineage":["https://openalex.org/I134085113"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mohammed Alkubaish","raw_affiliation_strings":["King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia","institution_ids":["https://openalex.org/I134085113"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049285151","display_name":"Daisuke Mashima","orcid":"https://orcid.org/0000-0003-1946-1790"},"institutions":[{"id":"https://openalex.org/I152815399","display_name":"Singapore University of Technology and Design","ror":"https://ror.org/05j6fvn87","country_code":"SG","type":"education","lineage":["https://openalex.org/I152815399"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Daisuke Mashima","raw_affiliation_strings":["Singapore University of Technology and Design, Singapore"],"affiliations":[{"raw_affiliation_string":"Singapore University of Technology and Design, Singapore","institution_ids":["https://openalex.org/I152815399"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5127783547"],"corresponding_institution_ids":["https://openalex.org/I134085113"],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.55137568,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"7","issue":null,"first_page":"574","last_page":"586"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.1956000030040741,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12268","display_name":"Deception detection and forensic psychology","score":0.1956000030040741,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12572","display_name":"Intelligence, Security, War Strategy","score":0.15000000596046448,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.05350000038743019,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.9775000214576721},{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.7063000202178955},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5210000276565552},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.5013999938964844},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.4366999864578247},{"id":"https://openalex.org/keywords/fidelity","display_name":"Fidelity","score":0.4244999885559082},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.34060001373291016},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.3379000127315521},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.3321000039577484}],"concepts":[{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.9775000214576721},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7184000015258789},{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.7063000202178955},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5210000276565552},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.5013999938964844},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4799000024795532},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.4366999864578247},{"id":"https://openalex.org/C2776459999","wikidata":"https://www.wikidata.org/wiki/Q2119376","display_name":"Fidelity","level":2,"score":0.4244999885559082},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.34060001373291016},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.3379000127315521},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.3321000039577484},{"id":"https://openalex.org/C2781133158","wikidata":"https://www.wikidata.org/wiki/Q1088669","display_name":"Survivability","level":2,"score":0.32030001282691956},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.31940001249313354},{"id":"https://openalex.org/C185874996","wikidata":"https://www.wikidata.org/wiki/Q269699","display_name":"Interdependence","level":2,"score":0.29919999837875366},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.2964000105857849},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.290800005197525},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2890999913215637},{"id":"https://openalex.org/C177212765","wikidata":"https://www.wikidata.org/wiki/Q627335","display_name":"Workflow","level":2,"score":0.28459998965263367},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2824000120162964},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.2784000039100647},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.27810001373291016},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.27639999985694885},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.26100000739097595},{"id":"https://openalex.org/C543847140","wikidata":"https://www.wikidata.org/wiki/Q2642826","display_name":"Realism","level":2,"score":0.2549000084400177}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ojcs.2026.3669021","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcs.2026.3669021","pdf_url":null,"source":{"id":"https://openalex.org/S4210176459","display_name":"IEEE Open Journal of the Computer Society","issn_l":"2644-1268","issn":["2644-1268"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Computer Society","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:277575fe60ae477cb5931356206bb75c","is_oa":true,"landing_page_url":"https://doaj.org/article/277575fe60ae477cb5931356206bb75c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Open Journal of the Computer Society, Vol 7, Pp 574-586 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ojcs.2026.3669021","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcs.2026.3669021","pdf_url":null,"source":{"id":"https://openalex.org/S4210176459","display_name":"IEEE Open Journal of the Computer Society","issn_l":"2644-1268","issn":["2644-1268"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Computer Society","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Honeypots":[0],"are":[1,88],"defensive":[2],"mechanisms":[3],"that":[4,216],"deceive":[5],"adversaries":[6],"by":[7,58],"deploying":[8],"fabricated":[9],"assets,":[10],"systems,":[11],"data,":[12],"and":[13,40,83,98,103,124,151,194,244,253,257],"credentials,":[14],"as":[15,38,45],"decoys":[16,87],"or":[17],"lures":[18],"within":[19],"a":[20,108,112,172,212,234,239,245],"network.":[21],"Existing":[22],"honeypot":[23,53,156,184,207,214],"frameworks":[24],"often":[25],"integrate":[26],"open-source":[27],"projects":[28],"(e.g.,":[29],"Honeyd,":[30],"Cowrie)":[31],"to":[32,130,170,231,249],"emulate":[33],"common":[34,143,201],"network":[35,144],"services":[36],"such":[37],"SSH":[39],"HTTP,":[41,150],"which":[42],"frequently":[43],"serve":[44],"initial":[46],"vectors":[47],"of":[48,61,69,79,95,182,191,255],"exploitation":[49],"for":[50],"adversaries.":[51],"However,":[52],"practical":[54],"effectiveness":[55],"remains":[56],"constrained":[57],"the":[59,66,77,93,120,141,163,179,200,228,251],"challenge":[60],"high-fidelity,":[62],"i.e.,":[63],"accurately":[64],"modeling":[65],"state":[67],"space":[68],"real":[70,167],"services,":[71,145],"at":[72],"reasonable":[73],"resource":[74,128,187],"cost.":[75],"In":[76],"absence":[78],"adversary-centric":[80],"fidelity":[81,202],"evaluations":[82],"resource-aware":[84,221],"deployment":[85,254],"baselines,":[86],"easily":[89],"fingerprinted,":[90],"thereby":[91],"degrading":[92],"quality":[94,219],"threat":[96],"intelligence":[97],"wasting":[99],"valuable":[100],"computational,":[101],"memory,":[102,193],"address-space":[104],"resources.":[105],"We":[106,161,209],"develop":[107],"quantitative":[109,173,235],"framework":[110,123],"using":[111],"<italic":[113,125],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[114,126],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">honeypot":[115],"test":[116,242],"suite</i>":[117],"grounded":[118],"in":[119,189,205],"MITRE":[121],"ATT&CK":[122],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">containerized":[127],"benchmarking</i>":[129],"address":[131],"these":[132],"gaps.":[133],"Experiments":[134],"were":[135],"conducted":[136],"across":[137],"15":[138],"honeypots":[139],"covering":[140],"most":[142],"including":[146],"SSH,":[147],"FTP,":[148],"SMTP,":[149],"DNS,":[152],"with":[153,185,220],"three":[154],"distinct":[155],"implementations":[157,169],"evaluated":[158],"per":[159],"service.":[160],"analyzed":[162],"honeypots'":[164],"responses":[165],"against":[166],"system":[168],"derive":[171],"realism":[174,180,237],"score.":[175],"Furthermore,":[176],"we":[177,198],"compared":[178],"score":[181],"each":[183,206],"its":[186],"utilization":[188],"terms":[190],"CPU,":[192],"response":[195],"time.":[196],"Finally,":[197],"identified":[199],"breaches":[203],"observed":[204],"implementation.":[208],"further":[210],"propose":[211],"refined":[213],"taxonomy":[215],"align":[217],"deception":[218],"operation.":[222],"To":[223],"our":[224],"knowledge,":[225],"this":[226],"is":[227],"first":[229],"work":[230],"jointly":[232],"provide":[233],"ATT&CK-mapped":[236],"score,":[238],"cross-protocol":[240],"discriminative":[241],"suite,":[243],"containerized":[246],"resource-deviation":[247],"analysis":[248],"support":[250],"selection":[252],"realistic":[256],"low-overhead":[258],"honeypots.":[259]},"counts_by_year":[],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2026-03-03T00:00:00"}
