Cyber deception techniques that are tightly intertwined with applications pose significant technical challenges in production systems. Security measures are usually the responsibility of a system operator, but they are typically limited to accessing built software artifacts, not their source code. This limitation makes it particularly challenging to deploy cyber deception techniques at application runtime and without full control over the software development lifecycle. This work reviews 19 technical methods to accomplish this and evaluates them based on technical, topological, operational, and efficacy properties. We find some novel techniques beyond honeypots and reverse proxies that seem to have received little research interest despite their promise for cyber deception. We believe that overcoming these technical challenges can drive the adoption of more dynamic and personalized cyber deception techniques, tailored to specific classes of applications.
翻译:与应用程序紧密交织的网络欺骗技术在面向生产系统时面临显著技术挑战。安全措施通常由系统运维人员负责,但他们往往只能访问已构建的软件制品,而非源代码。这一限制使得在应用运行时部署网络欺骗技术尤为困难,且无法完全控制软件开发生命周期。本文回顾了19种实现上述目标的技术方法,并从技术特性、拓扑结构、运维效能及有效性四个维度对其进行了评估。我们发现除了蜜罐和反向代理之外,还存在一些新颖技术——这些技术虽在网络欺骗领域颇具潜力,却鲜少获得研究关注。我们认为,攻克这些技术难题将推动针对特定应用类别的动态化、个性化网络欺骗技术的广泛采用。