AI-Enhanced Deception Technologies for Cyber Defense: A Cognitive Load Framework for Professional Attack Surface Management
Keywords:
AI-enhanced deception, cyber defense, cognitive load, attack surface, threat detection, machine learningAbstract
The paper is an investigation into how AI-enabled deception technologies can be used in cyber defense and how to build a cognitive load framework to carry out professional management of attack surfaces. The study will focus on the issues that people in cybersecurity are dealing with when they are handling complex and changing cyber threats. This is done by introducing the use of deception tactics alongside AI to see how these technologies can shorten cognitive load and make better decisions when confronted with a defense operation. Methodology involves the use of case studies, real life examples and evaluation of the existing AI-based deception models. Some important results are that AI-supported deception measures, including dynamic honeypots and decoy systems, can effectively distract the attackers and the load placed on the security responders is minimized..
References
Bernard, L., Raina, S., Taylor, B., & Kaza, S. (2021). Minimizing cognitive overload in cybersecurity learning materials: An experimental study using eye-tracking. Information Security Education for Cyber Resilience, 47–63. https://doi.org/10.1007/978-3-030-80865-5_4
Das, R., & Sandhane, R. (2021). Artificial intelligence in cyber security. Journal of Physics: Conference Series, 1964(4). https://doi.org/10.1088/1742-6596/1964/4/042072
Dimitrov, W. (2020). The impact of the advanced technologies over the cyber attacks surface. Advances in Intelligent Systems and Computing, 509–518. https://doi.org/10.1007/978-3-030-51971-1_42
Gonzalez, C., Aggarwal, P., Cranford, E. A., & Lebiere, C. (2022). Adaptive cyberdefense with deception: A human–AI cognitive approach. 41–57. https://doi.org/10.1007/978-3-031-16613-6_3
Iyer, K. I. (2021). Adaptive honeypots: Dynamic deception tactics in modern cyber defense. International Journal of Science and Research Archive, 4(1), 340-351. https://doi.org/10.30574/ijsra.2021.4.1.0210
Jimmy, F. (2021). Emerging threats: The latest cybersecurity risks and the role of artificial intelligence in enhancing cybersecurity defenses. International Journal of Scientific Research and Management (IJSRM), 9(2), EC-2021-564-574. https://doi.org/10.18535/ijsrm/v9i2.ec01
Johnson, J. (2019). The AI-cyber nexus: Implications for military escalation, deterrence and strategic stability. Journal of Cyber Policy, 4(3), 1–19. https://doi.org/10.1080/23738871.2019.1701693
Kelly, C., Pitropakis, N., Mylonas, A., McKeown, S., & Buchanan, W. J. (2021). A comparative analysis of honeypots on different cloud platforms. Sensors, 21(7), 2433. https://doi.org/10.3390/s21072433
Oravec, J. A. (2022). The emergence of “truth machines”?: Artificial intelligence approaches to lie detection. Ethics and Information Technology, 24(1). https://doi.org/10.1007/s10676-022-09621-6
Steingartner, W., & Galinec, D. (2021). Cyber threats and cyber deception in hybrid warfare. Acta Polytechnica Hungarica, 18(3).
Tagwa Warrag, & Khawla Abd Elmajed. (2016). Information security in artificial intelligence: A study of the possible intersection. https://doi.org/10.5339/qfarc.2016.ictpp1679
Theisen, C., Munaiah, N., Al-Zyoud, M., Carver, J. C., Meneely, A., & Williams, L. (2018). Attack surface definitions: A systematic literature review. Information and Software Technology, 104, 94–103. https://doi.org/10.1016/j.infsof.2018.07.008
Urias, V. E., Stout, W. M. S., Luc-Watson, J., Grim, C., Liebrock, L., & Merza, M. (2017). Technologies to enable cyber deception. 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain, pp. 1-6. https://doi.org/10.1109/CCST.2017.8167793
Muniyandi, V. (2022). Harnessing Roslyn for advanced code analysis and optimization in cloud-based .NET applications on Microsoft Azure. International Journal of Communication Networks and Security, 14(4), 979-990.
Muniyandi, V. (2021). Extending Roslyn for custom code analysis and refactoring in large enterprise applications. International Journal of Science and Technology Research Archive, 3, 271-283.
Chellu, R. (2021). Secure Containerized Microservices Using PKI-Based Mutual TLS in Google Kubernetes Engine.
Chellu, R. (2022). Spectral Analysis of Cryptographic Hash Functions Using Fourier Techniques. Journal of Computational Analysis and Applications, 30(2).
Chellu, R. AI-Powered Intelligent Disaster Recovery and File Transfer Optimization for IBM Sterling and Connect: Direct in Cloud-Native Environments.
Chellu, R. (2024). Intelligent Data Movement: Leveraging AI to Optimize Managed File Transfer Performance Across Modern Enterprise Networks.
Chellu, R. Adaptive Quantum-Safe PKI Solutions for Nano-IoT Security Leveraging Cognitive Computing.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Well Testing Journal

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
This license requires that re-users give credit to the creator. It allows re-users to distribute, remix, adapt, and build upon the material in any medium or format, for noncommercial purposes only.