{"id":"https://openalex.org/W3047852247","doi":"https://doi.org/10.1145/3422337.3447824","title":"Role-Based Deception in Enterprise Networks","display_name":"Role-Based Deception in Enterprise Networks","publication_year":2021,"publication_date":"2021-04-10","ids":{"openalex":"https://openalex.org/W3047852247","doi":"https://doi.org/10.1145/3422337.3447824","mag":"3047852247"},"language":"en","primary_location":{"id":"doi:10.1145/3422337.3447824","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3422337.3447824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["arxiv","crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2008.02979","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083670965","display_name":"Iffat Anjum","orcid":"https://orcid.org/0000-0001-5412-0217"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Iffat Anjum","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA","North Carolina State Univ., Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State Univ., Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077937501","display_name":"Mu Zhu","orcid":"https://orcid.org/0000-0003-4303-4318"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mu Zhu","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA","North Carolina State Univ., Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State Univ., Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048047768","display_name":"Isaac Polinsky","orcid":"https://orcid.org/0009-0003-9111-6913"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Isaac Polinsky","raw_affiliation_strings":["North Carolina State University, RALEIGH, NC, USA","North Carolina State Univ., Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, RALEIGH, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State Univ., Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024034310","display_name":"William Enck","orcid":"https://orcid.org/0000-0002-3043-8092"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William Enck","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA","North Carolina State Univ., Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State Univ., Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074117167","display_name":"Michael K. Reiter","orcid":"https://orcid.org/0000-0001-7007-8274"},"institutions":[{"id":"https://openalex.org/I170897317","display_name":"Duke University","ror":"https://ror.org/00py81415","country_code":"US","type":"education","lineage":["https://openalex.org/I170897317"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michael K. Reiter","raw_affiliation_strings":["Duke University, Durham, NC, USA"],"affiliations":[{"raw_affiliation_string":"Duke University, Durham, NC, USA","institution_ids":["https://openalex.org/I170897317"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5020679327","display_name":"Munindar P. Singh","orcid":"https://orcid.org/0000-0003-3599-3893"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Munindar P. Singh","raw_affiliation_strings":["North Carolina State University, Raleigh, NC, USA","North Carolina State Univ., Raleigh, NC, USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State Univ., Raleigh, NC, USA","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5083670965"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01231848,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"65","last_page":"76"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.7456133365631104},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.698034405708313},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6552271842956543},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.6059322357177734},{"id":"https://openalex.org/keywords/enterprise-private-network","display_name":"Enterprise private network","score":0.58846515417099},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5074867606163025},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.4864659011363983},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38387563824653625}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.7456133365631104},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.698034405708313},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6552271842956543},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.6059322357177734},{"id":"https://openalex.org/C149859251","wikidata":"https://www.wikidata.org/wiki/Q483426","display_name":"Enterprise private network","level":2,"score":0.58846515417099},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5074867606163025},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.4864659011363983},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38387563824653625},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1145/3422337.3447824","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3422337.3447824","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:2008.02979","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2008.02979","pdf_url":"https://arxiv.org/pdf/2008.02979","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},{"id":"mag:3047852247","is_oa":true,"landing_page_url":"http://export.arxiv.org/pdf/2008.02979","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"arXiv (Cornell University)","raw_type":null},{"id":"doi:10.48550/arxiv.2008.02979","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2008.02979","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2008.02979","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2008.02979","pdf_url":"https://arxiv.org/pdf/2008.02979","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6432118919","display_name":null,"funder_award_id":"W911NF-17-1-0370","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7452299184","display_name":null,"funder_award_id":"W911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G8998121839","display_name":null,"funder_award_id":"911NF","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"}],"funders":[{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3047852247.pdf","grobid_xml":"https://content.openalex.org/works/W3047852247.grobid-xml"},"referenced_works_count":51,"referenced_works":["https://openalex.org/W22863249","https://openalex.org/W106863888","https://openalex.org/W151695039","https://openalex.org/W337489262","https://openalex.org/W1109422923","https://openalex.org/W1537198022","https://openalex.org/W1558403803","https://openalex.org/W1612694023","https://openalex.org/W1675033504","https://openalex.org/W1862398452","https://openalex.org/W1882012874","https://openalex.org/W1919929094","https://openalex.org/W1979091937","https://openalex.org/W1997222770","https://openalex.org/W2008251338","https://openalex.org/W2012666594","https://openalex.org/W2042477294","https://openalex.org/W2064266822","https://openalex.org/W2075741102","https://openalex.org/W2077375749","https://openalex.org/W2092681734","https://openalex.org/W2099995703","https://openalex.org/W2105785546","https://openalex.org/W2106869861","https://openalex.org/W2111444870","https://openalex.org/W2120561608","https://openalex.org/W2131463233","https://openalex.org/W2136930733","https://openalex.org/W2147118406","https://openalex.org/W2147988325","https://openalex.org/W2159601538","https://openalex.org/W2187626237","https://openalex.org/W2322832163","https://openalex.org/W2476275724","https://openalex.org/W2512667584","https://openalex.org/W2536759866","https://openalex.org/W2546300025","https://openalex.org/W2578477250","https://openalex.org/W2600267680","https://openalex.org/W2687657776","https://openalex.org/W2750601856","https://openalex.org/W2781956102","https://openalex.org/W2787596386","https://openalex.org/W2790712558","https://openalex.org/W2791798235","https://openalex.org/W2890090275","https://openalex.org/W2907985091","https://openalex.org/W2945401038","https://openalex.org/W2948008293","https://openalex.org/W2980759281","https://openalex.org/W3143816473"],"related_works":["https://openalex.org/W3008951265","https://openalex.org/W2016320410","https://openalex.org/W2566384264","https://openalex.org/W3004957086","https://openalex.org/W2134798469","https://openalex.org/W2185961772","https://openalex.org/W2404477155","https://openalex.org/W2397448211","https://openalex.org/W3035419220","https://openalex.org/W2887520221","https://openalex.org/W2334841390","https://openalex.org/W748779375","https://openalex.org/W2235588678","https://openalex.org/W2897464020","https://openalex.org/W2090987365","https://openalex.org/W1564727973","https://openalex.org/W3134685325","https://openalex.org/W2381315133","https://openalex.org/W1978015896","https://openalex.org/W2199076849"],"abstract_inverted_index":{"Historically,":[0],"enterprise":[1],"network":[2,79,95,99,111,145,176,188],"reconnaissance":[3],"is":[4,55,157,178],"an":[5,31,120,155],"active":[6],"process,":[7],"often":[8],"involving":[9],"port":[10],"scanning.":[11],"However,":[12],"as":[13,39,94],"routers":[14],"and":[15,47,62,124,149],"switches":[16],"become":[17,22],"more":[18,23],"complex,":[19],"they":[20],"also":[21,92],"susceptible":[24],"to":[25,56,60,73,85,97],"compromise.":[26],"From":[27],"this":[28,53],"vantage":[29],"point,":[30],"attacker":[32],"can":[33,160],"passively":[34],"identify":[35,162],"high-value":[36,86],"hosts":[37,83],"such":[38,64],"the":[40,78,103,129,163],"workstations":[41],"of":[42,52,81,118],"IT":[43],"administrators,":[44],"C-suite":[45],"executives,":[46],"finance":[48],"personnel.":[49],"The":[50,89],"goal":[51],"paper":[54],"develop":[57],"a":[58,115,141,179],"technique":[59],"deceive":[61],"dissuade":[63],"adversaries.":[65],"We":[66,113],"propose":[67],"HoneyRoles,":[68],"which":[69],"uses":[70],"honey":[71,90],"connections":[72,91],"build":[74],"metaphorical":[75],"haystacks":[76],"around":[77],"traffic":[80],"client":[82],"belonging":[84],"organizational":[87],"roles.":[88],"act":[93],"canaries":[96],"signal":[98],"compromise,":[100],"thereby":[101],"dissuading":[102],"adversary":[104],"from":[105],"acting":[106],"on":[107,144],"information":[108],"observed":[109],"in":[110,186],"flows.":[112],"design":[114],"prototype":[116],"implementation":[117],"HoneyRoles":[119,139,159],"OpenFlow":[121],"SDN":[122],"controller":[123],"evaluate":[125],"its":[126],"security":[127,150],"using":[128],"PRISM":[130],"probabilistic":[131],"model":[132],"checker.":[133],"Our":[134],"performance":[135],"evaluation":[136],"shows":[137],"that":[138,153,174],"has":[140],"small":[142],"effect":[143],"request":[146],"completion":[147],"time,":[148],"analysis":[151],"demonstrates":[152],"once":[154],"alert":[156],"raised,":[158],"quickly":[161],"compromised":[164,187],"switch":[165],"with":[166],"high":[167],"probability.":[168],"In":[169],"doing":[170],"so,":[171],"we":[172],"show":[173],"role-based":[175],"deception":[177],"promising":[180],"approach":[181],"for":[182],"defending":[183],"against":[184],"adversaries":[185],"devices.":[189]},"counts_by_year":[],"updated_date":"2026-03-14T08:43:22.919905","created_date":"2025-10-10T00:00:00"}
