Controllable Fake Document Infilling for Cyber Deception (Findings of EMNLP 2022)
-
Updated
Aug 29, 2023 - Jupyter Notebook
Controllable Fake Document Infilling for Cyber Deception (Findings of EMNLP 2022)
MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.
Junk credential generator for SQL in CSV format, intended to introduce uncertainty to attacker exfiltrated data.
An updated compilation of tools, frameworks, references, and papers relating to cognition-based defenses.
An awesome list of resources on deception-based security with honeypots and honeytokens
This project is about how honeypots can be misused to potentially perform DDoS attacks. It has the code to reproduce our work for the DTU course 02334-Research Topics For CyberSecurity.
An awesome list of resources on AI cyber deception, exploring adversarial machine learning techniques used to deceive and secure systems
This prototype hooks into the send and receive functions of glibc to insert deceptive elements into HTTP packets.
FLUIDOS Cyber Deception service
An AI-driven adaptive honeypot framework that dynamically deceives attackers, analyzes behavior using machine learning and reinforcement learning, and generates actionable threat intelligence mapped to the MITRE ATT&CK framework.
An AI-driven adaptive honeypot framework that dynamically deceives attackers, analyzes behavior using machine learning and reinforcement learning, and generates actionable threat intelligence mapped to the MITRE ATT&CK framework.
Koney is a Kubernetes operator that enables you to define so-called deception policies for your cluster. Koney automates the setup, rotation, and teardown of honeytokens and fake API endpoints, and uses eBPF to detect, log, and forward alerts when your traps have been accessed.
AI LLM Firewall -- Detection, Deception, and Intelligence for LLM Security. 9 SDK integrations, 12 LLM backends, 0% false positives. Apache 2.0.
🍯 Discover AI-driven deception resources, including honeypots, datasets, and research, to enhance your defense against cyber threats and adversarial attacks.
Add a description, image, and links to the cyber-deception topic page so that developers can more easily learn about it.
To associate your repository with the cyber-deception topic, visit your repo's landing page and select "manage topics."