AI-Enhanced Deception Technologies for Cyber Defense: A Cognitive Load Framework for Professional Attack Surface Management

Authors

  • Tim Abdiukov NTS

Keywords:

AI-enhanced deception, cyber defense, cognitive load, attack surface, threat detection, machine learning

Abstract

The paper is an investigation into how AI-enabled deception technologies can be used in cyber defense and how to build a cognitive load framework to carry out professional management of attack surfaces. The study will focus on the issues that people in cybersecurity are dealing with when they are handling complex and changing cyber threats. This is done by introducing the use of deception tactics alongside AI to see how these technologies can shorten cognitive load and make better decisions when confronted with a defense operation. Methodology involves the use of case studies, real life examples and evaluation of the existing AI-based deception models. Some important results are that AI-supported deception measures, including dynamic honeypots and decoy systems, can effectively distract the attackers and the load placed on the security responders is minimized..

References

Bernard, L., Raina, S., Taylor, B., & Kaza, S. (2021). Minimizing cognitive overload in cybersecurity learning materials: An experimental study using eye-tracking. Information Security Education for Cyber Resilience, 47–63. https://doi.org/10.1007/978-3-030-80865-5_4

Das, R., & Sandhane, R. (2021). Artificial intelligence in cyber security. Journal of Physics: Conference Series, 1964(4). https://doi.org/10.1088/1742-6596/1964/4/042072

Dimitrov, W. (2020). The impact of the advanced technologies over the cyber attacks surface. Advances in Intelligent Systems and Computing, 509–518. https://doi.org/10.1007/978-3-030-51971-1_42

Gonzalez, C., Aggarwal, P., Cranford, E. A., & Lebiere, C. (2022). Adaptive cyberdefense with deception: A human–AI cognitive approach. 41–57. https://doi.org/10.1007/978-3-031-16613-6_3

Iyer, K. I. (2021). Adaptive honeypots: Dynamic deception tactics in modern cyber defense. International Journal of Science and Research Archive, 4(1), 340-351. https://doi.org/10.30574/ijsra.2021.4.1.0210

Jimmy, F. (2021). Emerging threats: The latest cybersecurity risks and the role of artificial intelligence in enhancing cybersecurity defenses. International Journal of Scientific Research and Management (IJSRM), 9(2), EC-2021-564-574. https://doi.org/10.18535/ijsrm/v9i2.ec01

Johnson, J. (2019). The AI-cyber nexus: Implications for military escalation, deterrence and strategic stability. Journal of Cyber Policy, 4(3), 1–19. https://doi.org/10.1080/23738871.2019.1701693

Kelly, C., Pitropakis, N., Mylonas, A., McKeown, S., & Buchanan, W. J. (2021). A comparative analysis of honeypots on different cloud platforms. Sensors, 21(7), 2433. https://doi.org/10.3390/s21072433

Oravec, J. A. (2022). The emergence of “truth machines”?: Artificial intelligence approaches to lie detection. Ethics and Information Technology, 24(1). https://doi.org/10.1007/s10676-022-09621-6

Steingartner, W., & Galinec, D. (2021). Cyber threats and cyber deception in hybrid warfare. Acta Polytechnica Hungarica, 18(3).

Tagwa Warrag, & Khawla Abd Elmajed. (2016). Information security in artificial intelligence: A study of the possible intersection. https://doi.org/10.5339/qfarc.2016.ictpp1679

Theisen, C., Munaiah, N., Al-Zyoud, M., Carver, J. C., Meneely, A., & Williams, L. (2018). Attack surface definitions: A systematic literature review. Information and Software Technology, 104, 94–103. https://doi.org/10.1016/j.infsof.2018.07.008

Urias, V. E., Stout, W. M. S., Luc-Watson, J., Grim, C., Liebrock, L., & Merza, M. (2017). Technologies to enable cyber deception. 2017 International Carnahan Conference on Security Technology (ICCST), Madrid, Spain, pp. 1-6. https://doi.org/10.1109/CCST.2017.8167793

Muniyandi, V. (2022). Harnessing Roslyn for advanced code analysis and optimization in cloud-based .NET applications on Microsoft Azure. International Journal of Communication Networks and Security, 14(4), 979-990.

Muniyandi, V. (2021). Extending Roslyn for custom code analysis and refactoring in large enterprise applications. International Journal of Science and Technology Research Archive, 3, 271-283.

Chellu, R. (2021). Secure Containerized Microservices Using PKI-Based Mutual TLS in Google Kubernetes Engine.

Chellu, R. (2022). Spectral Analysis of Cryptographic Hash Functions Using Fourier Techniques. Journal of Computational Analysis and Applications, 30(2).

Chellu, R. AI-Powered Intelligent Disaster Recovery and File Transfer Optimization for IBM Sterling and Connect: Direct in Cloud-Native Environments.

Chellu, R. (2024). Intelligent Data Movement: Leveraging AI to Optimize Managed File Transfer Performance Across Modern Enterprise Networks.

Chellu, R. Adaptive Quantum-Safe PKI Solutions for Nano-IoT Security Leveraging Cognitive Computing.

Published

31-12-2024

How to Cite

Abdiukov, T. (2024). AI-Enhanced Deception Technologies for Cyber Defense: A Cognitive Load Framework for Professional Attack Surface Management. Well Testing Journal, 33(S2), 750–768. Retrieved from https://welltestingjournal.com/index.php/WT/article/view/187

Issue

Section

Research Articles

Similar Articles

1 2 3 4 5 6 7 > >> 

You may also start an advanced similarity search for this article.