Have a personal or library account? Click to login
Defensive Deception in Network Security ‒ Concepts and Game ‒ Theoretic Approaches Cover

Defensive Deception in Network Security ‒ Concepts and Game ‒ Theoretic Approaches

By: Răzvan Florea and  Mitică Craus  
Open Access
|Dec 2025

References

  1. Aggarwal, P., Gonzalez, C., & Dutt, V. (2016). Cyber-security: Role of deception in cyber-attack detection. In Marciniak R, editor. Advances in Human Factors in Cybersecurity. Cham: Springer; pp. 85-96. Available at: https://doi.org/10.1007/978-3-319-41932-9_8.
  2. Almeshekah, M.H., & Spafford, E.H. (2014). Planning and integrating deception into computer security defenses. Proceedings of the New Security Paradigms Workshop, 127-138. Available at: https://doi.org/10.1145/2683467.2683482.
  3. Almeshekah, M.H., & Spafford, E.H. (2016). Cyber security deception. In Almeshekah MH, Spafford EH, editors. Cyber Deception. Cham: Springer, 23-50. Available at: https://doi.org/10.1007/978-3-319-32699-3_2.
  4. Anwar, A.H., & Kamhoua, C. (2020). Game theory on attack graph for cyber deception. Proceedings of the International Conference on Decision and Game Theory for Security, 445-456. Available at: https://doi.org/10.1007/978-3-030-64793-3_24.
  5. Borello, J.M., & Mè L.(2008). Code obfuscation techniques for metamorphic viruses. J Com-put Virol, 4(3), 211-220. Available at: https://doi.org/10.1007/s11416-008-0084-2.
  6. Chan, J.-T., & Yang, W. (2004). Advanced obfuscation techniques for Java bytecode. J Syst Softw, 71(1), 1-10. Available at: https://doi.org/10.1016/S0164-1212(02)00066-3.
  7. Florea, R., & Craus, M. (2022a). Modeling an Enterprise Environment for Testing Openstack Cloud Platform against Low-Rate DDoS Attacks. 26th International Conference on System Theory, Control and Computing (ICSTCC). Available at: https://doi.org/10.1109/ICSTCC55426.2022.9931822.
  8. Florea, R., & Craus, M. (2022b). A Game-Theoretic Approach for Network Security Using Honeypots. Future Internet, 14(12), 362. Available at: https://doi.org/10.3390/fi14120362.
  9. Florea, R.; & Craus, M. (2025). Enhancing Network Security through Integration of Game Theory in Software-Defined Networking Framework. Springer Nature - International Journal of Information Security, Vol. 24. Available at: https://doi.org/10.1007/s10207-025-01012-4.
  10. Jajodia, S, Ghosh, A.K., Subrahmanian, V.S., Swarup, V., Wang, C., & Wang, X. (2017). Aprobabilistic logic of cyber deception. IEEE Trans Inf Forensics Secure, 12(11), 2532-2544. Available at: https://doi.org/10.1109/TIFS.2017.2710945.
  11. Jafarian, J.H., & Niakanlahiji, A. (2020). A deception planning framework for cyber defense. Proceedings of the 53rd Hawaii International Conference on System Sciences, 242. Available at: https://doi.org/10.24251/HICSS.2020.234.
  12. Mao, D., Zhang, S., Zhang, L., & Feng, Y. (2019). Game theory based dynamic defense mechanism for SDN. Proceedings of the International Conference on Machine Learning for Cyber Security, 290-303. Available at: https://doi.org/10.1007/978-3-030-30619-9_21.
  13. Nan, S., Brahma, S., Kamhoua, C.A., & Njilla, L.L. (2020). On Development of a Game-Theoretic Model for Deception-Based Security. In: Kamhoua CA, editor. Game Theory and Machine Learning for Cyber Security. Hoboken, NJ: Wiley. pp. 123-140. DOI: 10.1002/9781119593386.ch6.
  14. Pawlick, J., & Zhu, Q. (2015). Deception by design: Evidence-based signaling games for network defense. Cornel University, Computer Science. Available at: https://doi.org/10.48550/arXiv.1503.05458.
  15. Pawlick, J., Farhang, S., & Zhu, Q. (2015). Flip the cloud: Cyber-physical signaling games in the presence of advanced persistent threats. Proceedings of the International Conference on Decision and Game Theory for Security, 289-308. Available at: https://doi.org/10.48550/arXiv.1507.00576.
  16. Rowe, N.C., & Rrushi, J.(2016). Introduction to Cyberdeception. Heidelberg: Springer Nature. Available at: https://doi.org/10.1007/978-3-319-41187-3.
  17. Ward, B.C., et al. (2018). Survey of cyber moving targets second edition. MIT Lincoln Lab, Cambridge, MA, USA. Report No.: 1228.
  18. You, I., & Yim, K. (2010). Malware obfuscation techniques: A brief survey. Proceedings of the International Conference on Broadband, Wireless Computing, Communication and Applications, 297-300. Available at: https://doi.rog/10.1109/BWCCA.2010.85.
DOI: https://doi.org/10.2478/raft-2025-0063 | Journal eISSN: 3100-5071 | Journal ISSN: 3100-5063
Language: English
Page range: 668 - 678
Published on: Dec 15, 2025
Published by: Nicolae Balcescu Land Forces Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2025 Răzvan Florea, Mitică Craus, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License.